SU and Security University Testing (SUT) Qualified Certificate Programs of Mastery and SUT Certifications has partnered with the National Security Workforce to place over 43 cyber security courses and corresponding SUT Qualified Certifications within the NICE Cybersecurity Framework Mapping. The SU Cybersecruity Maaping Framework Compendium below will help you identify the SU courses and SUT Qualified Certifications necessary to advance your cyber career as a Federal Employee.
Security University maps all Qualified Certificate programs to NICE Framework v2.0 (March 2025) and DoD Cyber Workforce Framework (DCWF) work roles to ensure 8140.03 compliance.
Many of the courses and certifications found on the NICE Cybersecurity Framework are DoD 8140 (DoD 8570) compliant. Visit the DoD 8140 resource page for the full list of associated SUT Certifications.
| Cybersecurity Workforce Categories | |||||||
|---|---|---|---|---|---|---|---|
| Work Roles | Threat/Warning Analyst
AN-WRL-001 |
Cyber Crime Investigator
IN-WRL-001 |
System Administrator
OM-WRL-001 |
Cyber Defense Infrastructure Support Specialist
PD-WRL-001 |
Secure Software Developer
SP-WRL-001 |
||
Exploitation Analyst
AN-WRL-002 |
Digital Evidence Analyst
IN-WRL-002 |
Information Systems Security Manager
OM-WRL-002 |
Cyber Defense Analyst
PD-WRL-002 |
Software Assessor
SP-WRL-002 |
|||
All Source Analyst
AN-WRL-003 |
Technical Support Specialist
OM-WRL-003 |
Cyber Defense Incident Responder
PD-WRL-003 |
Enterprise Architect
SP-WRL-003 |
||||
Targets Analyst
AN-WRL-004 |
Network Operations Specialist
OM-WRL-004 |
Cyber Defense Forensics Analyst
PD-WRL-004 |
Security Architect
SP-WRL-004 |
||||
Cyber Intel Planner
AN-WRL-005 |
Data Center Support Specialist
OM-WRL-005 |
Insider Threat Analyst
PD-WRL-005 |
Systems Requirements Planner
SP-WRL-005 |
||||
Systems Developer
SP-WRL-006 |
|||||||
Information Systems Security Engineer SP-WRL-007 |
|||||||
Hardware Assurance Specialist
SP-WRL-008 |
|||||||
Department of Defense Cyber Workforce Framework (DCWF)
The Department of Defense Cyber Workforce Framework (DCWF) chart below outlines the categories and roles defined under DoDM 8140.03. This framework is used by the DoD to structure and manage cyber workforce qualifications and training. Security University includes this chart to support our students and clients working in or pursuing careers in the federal and military cyber workforce. It complements the NICE Framework chart above, which remains widely used in civilian and academic environments.

Cybersecurity Work Roles
| Analyze (AN) | Back to Top | |
|---|---|---|
Exploitation Analyst - AN-WRL-002 |
||
| SU Training Course | SUT Certification | Work Role Proficiency |
Q/EH® Qualified/ Ethical Hacker Certification Class |
SUT Q/EH® Qualified/ Ethical Hacker Certification |
3: Advanced |
Q/SA® Qualified/ Security Analyst Penetration Tester Certification Class |
SUT Q/SA® Qualified/ Security Analyst Penetration Tester Certification |
3: Advanced |
*Q/PTL® Qualified/ Penetration Tester License Class/ Workshop Practical |
SUT *Q/PTL® Qualified/ Penetration Tester License Class/ Workshop Practical |
4: Expert |
*Q/ND® Qualified/ Network Defender Certification Class Practical |
SUT *Q/ND® Qualified/ Network Defender Certification |
4: Expert |
Other Mapped SU Training and SUT Certifications:
|
||
| Analyze (AN) | Back to Top | |
|---|---|---|
Work Role: Targets Analyst - AN-WRL-004 |
||
| SU Training Course | SUT Certification | Work Role Proficiency |
Q/EH® Qualified/ Ethical Hacker Certification Class |
SUT Q/EH® Qualified/ Ethical Hacker Certification Class |
3: Advanced |
Q/SA® Qualified/ Security Analyst Penetration Tester Certification Class |
SUT Q/SA® Qualified/ Security Analyst Penetration Tester Certification Class |
3: Advanced |
Q/PTL® Qualified/ Penetration Tester License Class/ Workshop Practical |
Q/PTL® Qualified/ Penetration Tester License Class/ Workshop Practical |
4: Expert |
Q/CDA Qualified/ Cyber Defense Analyst Certification Class |
SUT Q/CDA Qualified/ Cyber Defense Analyst Certification Class |
3: Advanced |
Q/CDA Qualified/ Cyber Defense Analyst Certification Class |
SUT Q/CDA Qualified/ Cyber Defense Analyst Certification |
3: Advanced |
Other Mapped SU Training and SUT Certifications:
|
||
| Operate & Maintain (OM) | Back to Top | |
|---|---|---|
Work Role: System Administrator - OM-WRL-001 |
||
| SU Training Course | SUT Certification | Work Role Proficiency |
Security+ |
CompTIA Security+ |
Intermediate |
How to Break & FIX Web Security Certification Class |
How to Break & FIX Web Security Certification Class |
Advanced |
Other Mapped SU Training and SUT Certifications:
|
||
| Operate & Maintain (OM) | Back to Top | |
|---|---|---|
Work Role: Information Systems Security Manager - OM-WRL-002 |
||
| SU Training Course | SUT Certification | Work Role Proficiency |
Security+ |
CompTIA Security+ |
Intermediate |
SU How to Break & FIX Web Security Certification Class |
SUT How to Break & FIX Web Security Certification Class |
Advanced |
Other Mapped SU Training and SUT Certifications:
|
||
| Operate & Maintain (OM) | Back to Top | |
|---|---|---|
Work Role: Technical Support Specialist - OM-WRL-003 |
||
| SU Training Course | SUT Certification | Work Role Proficiency |
Security+ |
CompTIA Security+ |
2: Intermediate |
PowerShell Forensics Certification Class |
PowerShell Forensics Certification Class |
3: Advanced |
Linux/UNIX® Security Certification Class |
Linux/UNIX® Security Certification Class |
3: Advanced |
Other Mapped SU Training and SUT Certifications:
|
||
| Operate & Maintain (OM) | Back to Top | |
|---|---|---|
Work Role: Network Operations Specialist - OM-WRL-004 |
||
| SU Training Course | SUT Certification | Work Role Proficiency |
Security+ |
CompTIA Security+ |
Intermediate |
SU Q/EH® Qualified/ Ethical Hacker Certification Class |
SUT Q/EH® Qualified/ Ethical Hacker Certification |
Advanced |
SU Q/SA® Qualified/ Security Analyst Penetration Tester Certification Class |
SUT Q/SA® Qualified/ Security Analyst Penetration Tester Certification Class |
Expert |
SU Q/PTL® Qualified/ Penetration Tester License Certification Lab Class |
SUT Q/PTL® Qualified/ Penetration Tester Certification Class |
4: Expert |
SU *Q/ND® Qualified/ Network Defender Certification Class Practical |
SUT *Q/ND® Qualified/ Network Defender Certification & Practical |
4: Expert |
Other Mapped SU Training and SUT Certifications:
|
||
| Operate & Maintain (OM) | Back to Top | |
|---|---|---|
Work Role: Data Center Support Specialist - OM-WRL-005 |
||
| SU Training Course | SUT Certification | Work Role Proficiency |
Security+ |
CompTIA Security+ |
2: Intermediate |
SU Q/EH® Qualified/ Ethical Hacker Certification Class |
SUT Q/EH® Qualified/ Ethical Hacker Certification |
3: Advanced |
SU Q/SA® Qualified/ Security Analyst Penetration Tester Certification Class |
SUT Q/SA® Qualified/ Security Analyst Penetration Tester Certification Class |
3: Advanced |
SU Q/PTL® Qualified/ Penetration Tester License Certification Class |
SUT Q/PTL® Qualified/ Penetration Tester Certification Class |
4: Expert |
*Q/ND® Qualified/ Network Defender Certification Class Practical |
*Q/ND® Qualified/ Network Defender Certification & Practical |
4: Expert |
*Q/FE® Qualified/ Forensic Expert Certification & Practical |
*Q/FE® Qualified/ Forensic Expert Certification & Practical |
4: Expert |
Other Mapped SU Training and SUT Certifications:
|
||
| Protect & Defend (PD) | Back to Top | |
|---|---|---|
Work Role: Cyber Defense Analyst - PD-WRL-002 |
||
| SU Training Course | SUT Certification | Work Role Proficiency |
SU Security+ Certification Class |
CompTIA Security+ |
2. Intermediate |
SU Q/SA® Qualified/ Security Analyst Penetration Tester |
SU Q/SA® Qualified/ Security Analyst Penetration Tester |
3. Advanced |
SU IDS I Catching the Hackers – Introduction to Intrusion Detection Certification Class |
SUT Qualified Intrusion Analyst |
3: Advanced |
SU IDS II Catching the Hackers II: Systems to Defend Networks Certification Class |
SUT Continuous Monitoring Certification |
4. Expert |
SU IDS III: On-site Log Analysis, Event Correlation and Response Certification Class |
IDS III: On-site Log Analysis, Event Correlation and Response Certification Class |
4: Expert |
SU Q/CDA Qualified/ Cyber Defense Analyst Certification Class |
Q/CDA Qualified/ Cyber Defense Analyst Certification Class |
4: Expert |
Other Mapped SU Training and SUT Certifications:
|
||
| Protect & Defend (PD) | Back to Top | |
|---|---|---|
Work Role: Cyber Defense Incident Responder - PD-WRL-003 |
||
| SU Training Course | SUT Certification | Work Role Proficiency |
SU Security + Certification Class |
CompTIA Security + Certification |
2. Intermediate |
SU Q/EH® Qualified/ Ethical Hacker Certification Class |
SUT Q/EH® Qualified/ Ethical Hacker Certification Class |
3. Advanced |
SU QFE® Qualified/ Forensic Expert Certification Class Practical |
SUT *QFE® Qualified/ Forensic Expert Certification Class Practical |
3: Advanced |
Other Mapped SU Training and SUT Certifications:
|
||
| Protect & Defend (PD) | Back to Top | |
|---|---|---|
Work Role: Cyber Defense Forensics Analyst - PD-WRL-004 |
||
| SU Training Course | SUT Certification | Work Role Proficiency |
Enterprise Threat and Vulnerability Assessment |
N/A |
2. Intermediate |
SU How to Break & FIX Web Security Certification Class & Web App Penetration Testing |
SUT How to Break & FIX Web Security Certification Class |
3. Advanced |
SU Q/EH® Qualified/ Ethical Hacker Certification Class |
SUT Q/EH® Qualified/ Ethical Hacker Certification Class |
3: Advanced |
SU Q/SA® Qualified/ Security Analyst Certification Class |
SUT Q/SA Qualified/ Security Analyst Penetration Tester Certification Class |
4: Expert |
SU *Q/PTL® Qualified/ Penetration Tester License Class/ Workshop Practical |
SUT *Q/PTL® Qualified/ Penetration Tester License Class/ Workshop Practical |
4. Expert |
Advanced Penetration Testing, Exploit Writing, and Ethical Hacking |
SUT Exploit Researcher and Advanced Penetration Tester |
4. Expert |
Other Mapped SU Training and SUT Certifications:
|
||
| Securely Provision (SP) | Back to Top | |
|---|---|---|
Work Role: Secure Software Developer - SP-WRL-001 |
||
| SU Training Course | SUT Certification | Work Role Proficiency |
SU *Q/SSE® Qualified/ Software Security Expert Certification Class |
SUT *Q/SSE® Qualified/ Software Security Expert Certification |
3: Advanced |
SU Q/SSPT® Qualified/ Software Security Penetration Tester Certification Class |
SUT Q/SSPT® Qualified/ Software Security Penetration Tester Certification |
3: Advanced |
3: Advanced |
||
Other Mapped SU Training and SUT Certifications:
|
||
| Securely Provision (SP) | Back to Top | |
|---|---|---|
Work Role: Software Assessor - SP-WRL-002 |
||
| SU Training Course | SUT Certification | Work Role Proficiency |
CompTIA Security+ |
2: Intermediate |
|
SU CISSP®Qualified Information Security Systems Professional Class |
ISC2 CISSP Information Security |
2. Intermediate |
CompTIA Linux+ |
2: Intermediate |
|
Other Mapped SU Training and SUT Certifications:
|
||
| Securely Provision (SP) | Back to Top | |
|---|---|---|
Work Role: Enterprise Architect - SP-WRL-003 |
||
| SU Training Course | SUT Certification | Work Role Proficiency |
SU Q/ND® Qualified/ Network Defender Certification Class Practical |
SUT Q/ND® Qualified/ Network Defender Certification Class Practical |
3: Advanced |
SU Q/ISP Qualified/ Information Security Professional Certificate Program of Mastery |
SU Q/ISP® Qualified/ Information Security Professional Certificate Program of Mastery |
3: Expert |
SU Cloud Computing Security Knowledge Certification |
Cloud Computing Security Knowledge Certification |
3: Advanced |
| Securely Provision (SP) | Back to Top | |
|---|---|---|
Work Role: Security Architect - SP-WRL-004 |
||
| SU Training Course | SUT Certification | Work Role Proficiency |
SU *Q/ND® Qualified/ Network Defender Certification Class Practical |
SUT *Q/ND® Qualified/ Network Defender Certification Class Practical |
3: Advanced |
SU Q/AA RMF Risk Management Framework - Qualified/ Authorization & Accreditation Class |
SUT Q/AA RMF Risk Management Framework - Qualified/ Authorization & Accreditation Class |
3: Advanced |
Other Mapped SU Training and SUT Certifications:
|
||
| Securely Provision (SP) | Back to Top | |
|---|---|---|
Work Role: Systems Requirements Planner - SP-WRL-005 |
||
| SU Training Course | SUT Certification | Work Role Proficiency |
SU Certified ISO 27001 ISMS® Lead Auditor Class |
SUT Certified ISO 27001 SU ISMS® Lead Auditor Certification |
2: Intermediate |
SU Certified ISO 27001 ISMS® Lead Implementer Certification Class |
SUT Certified ISO 27001 SU ISMS® Lead Implementer Certification |
2: Intermediate |
Other Mapped SU Training and SUT Certifications:
|
||
| Securely Provision (SP) | Back to Top | |
|---|---|---|
Work Role: Systems Developer - SP-WRL-006 |
||
| SU Training Course | SUT Certification | Work Role Proficiency |
*Q/SSE® Qualified/ Software Security Expert 5 Day Bootcamp Certification Class |
*Q/SSE® Qualified/ Software Security Expert 5 Day Bootcamp Certification Class |
3: Advanced |
How to Break & FIX Web Security Certification Class |
How to Break & FIX Web Security Certification Class |
3: Advanced |
Other Mapped SU Training and SUT Certifications:
|
||
| Securely Provision (SP) | Back to Top | |
|---|---|---|
Work Role: Information Systems Security Engineer - SP-WRL-007 |
||
| SU Training Course | SUT Certification | Work Role Proficiency |
SU Q/AA RMF Risk Management Framework - Qualified/ Authorization & Accreditation Class* |
SUT Q/AA RMF Risk Management Framework - Qualified/ Authorization & Accreditation |
3: Advanced |
SU Q/SA® Qualified/ Security Analyst Penetration Tester Certification Class |
SUT Q/SA® Qualified/ Security Analyst Penetration Tester Certification |
3: Advanced |
SUF Cloud Computing Security Knowledge Certification |
SUT CCSK Cloud Computing Security Knowledge Certification |
3: Advanced |
Other Mapped SU Training and SUT Certifications:
|
||
| Securely Provision (SP) | Back to Top | |
|---|---|---|
Work Role: Hardware Assurance Specialist - SP-WRL-008 |
||
| SU Training Course | SUT Certification | Work Role Proficiency |
|
||
|
||
|
||
Ensuring a Trained and Certified and Qualified/ Cyber Security Workforce
Since our first Q/SA- Q/PTL class SU provided at SANS Orlando 1999, SU's "hands-on training" and SUT Certifications have pioneered performance based competency based cybersecurity training with practicals to validate cyber skills, going way beyond theory based classes, to learn hands-on skills necessary to defend our networks and our national critical infrastructure against foreign and domestic threats. Using the proven “Schneider Method” of stacked (successively more challenging) instructor led hands-on, competency-based cyber curricula of 40 hour classes over 2, 6, or 8 weeks to develop key cyber skills for cyber careers.
20 years of competency based experience demonstrates SU's capability to build a certified and qualified workforce focusing on advanced tactical deep knowledge; instructor and peer validated skills and real world applications needed to prove your team can meet Federal Contract requirements.
The NICE Cybersecurity Framework provides a blueprint to categorize, organize, and describe cybersecurity work into Specialty Areas, Categories and new Work Roles. Identifying the needs of a trained, certified and qualified workforce, is further by defining critical tasks, knowledge, skills and abilities (KSAs). The Cybersecurity Workforce Framework provides a common language to help define professional work requirements in cybersecurity speak on resumes, job role descriptions and career objectives’.
Using the NICE Cybersecurity Framework
SU classes and SUT Certifications are mapped to the NICE Cybersecurity Workrole Framework. For ease of use we have formatted both the downloadable .pdf and the Interactive Map utilizing the work role as the basis.
Everything you need to know about that job role, specialty area, and map to SU Instructor Led Training Courses and the affiliated SUT Certifications are located on one page or section; including the SU Course, SUT Certification, and proficiency levels. To maintain organizational integrity, SU and SUT NICE Framework approach includes only courses and certifications that mapp and made sense.
Basic Information About Proficiency Levels
Basic - Training maps to many knowledge statements, simpler skills, and tasks that are pre-requisites to an employee being effective in this job role.
Intermediate - Training maps to many mid-level knowledge, skills, abilities and tasks. Employee can be reasonably effective in this job role after receiving training.
Advanced - Maps to higher level knowledge, skills, abilities, and tasks. Employee should be very effective in this functional area after receiving training. However, some lower level, pre-requisite KSAs may not be covered by these courses.
Expert - Maps to few very specific KSAs or tasks in a highly focused area. This training assumes someone is already well trained and effective in this job role overall. It focuses on expertise in a very specific, narrow area.



