Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

WHAT IS DoD 8140?

The DoD Directive (DoDD) 8140 unifies the overall cyber workforce and establishes specific workforce elements, including information technology (IT), cybersecurity, cyber effects, cyber (intel), and cyber enablers. This directive aims to align, manage, and standardize cyber work roles, baseline qualifications, and training requirements. It establishes the DoD Cyberspace Workforce Framework (DCWF) as the authoritative reference for identifying, tracking, and reporting DoD cyberspace positions, serving as a foundation for developing enterprise baseline cyberspace workforce qualifications.

The goals of the 8140 Directive are to:

  1. Provide a larger array of standards-based certification and training options based on 72 work roles that are currently defined.
  2. Allow DoD workers to choose between certification and training options, such as well-defined work roles or assessment-based training for emerging technologies.
  3. Attract, upskill, and retain an inclusive workforce and track progress, ensuring the DoD workforce reflects the diversity of skills, perspectives, and experiences found in the overall population.

 

DoD CYBER WORKFORCE FRAMEWORK

The DoD Cyber Workforce Framework (DCWF) establishes the DoD’s authoritative lexicon based on the work an individual is performing, not their position titles, occupational series, or designators. The DCWF describes the work performed by the full spectrum of the cyber workforce as defined in DoD Directive (DoDD) 8140. The DCWF leverages the original National Initiative for Cybersecurity Education (NICE), Cybersecurity Workforce Framework (NCWF), and the DoD Joint Cyberspace Training and Certification Standards (JCT&CS).

 

WORKFORCE ELEMENTS AND ASSOCIATED WORK ROLES

IT (Cyberspace): Personnel who design, build, configure, operate, and maintain IT networks and capabilities. This includes actions to prioritize implementing, evaluating, and disposing of resource management, storage, transmission, and display of data and information.

Database Administrator System Administrator
Enterprise Architect System Testing & Evaluation Specialist
Knowledge Manager Systems Developer
Network Manager Systems Requirement Planner
Network Operations Specialist Tech Support Specialist
Research and Development Specialist  

 

Cybersecurity: Personnel who secure, defend, and preserve data, networks, net-centric capabilities, and other designated systems through appropriate security controls and internal defense actions. This includes access to system controls, monitoring, administration, and integration of cybersecurity into all aspects of engineering and acquisition of cyberspace capabilities.

Authorizing Official/Designating Representative Information Systems Security Developer
COMSEC Manager Information Systems Security Manager
Cyber Defense Analyst Secure Software Assessor
Cyber Defense Forensics Analyst Security Architect
Cyber Defense Incident Responder Security Control Assessor
Cyber Defense Infrastructure Support Specialist Vulnerability Assessment Analyst

 

Cyberspace Effects: Personnel who plan, support, and execute cyberspace capabilities with the primary purpose to externally defend or conduct force projection in or through cyberspace.

Cyber Operations Planner Target Developer
Exploitation Analyst Target Network Analyst
Mission Assessment Specialist Warning Analyst
Partner Integration Planner  

 

Intelligence (Cyberspace): Personnel who collect, process, analyze, and disseminate information from all sources of intelligence on foreign actors’ cyberspace programs, intentions, capabilities, research and development, and operational activities.

All-Source Analyst Cyber Intelligence Planner
All-Source Collection Manager Multi-Disciplined Language Analyst
All-Source Collection Requirements Manager  

 

Cyberspace Enablers: Personnel who support or facilitate the functions of cyber IT, cybersecurity, cyberspace effects, or intelligence workforce (cyberspace) roles. This includes actions to support acquisition, training, and leadership activities.

IT Investment Portfolio Executive Cyber Leader
IT Program Auditor Privacy Compliance Manager
IT Project Manager Cyber Legal Advisor
Product Support Manager Cyber Crime Investigator
Program Manager Forensics Analyst
Cyber Policy and Strategy Planner Cyber Instructional Curriculum Developer
Cyber Workforce Developer and Manager Cyber Instructor

 

Software Engineering: Personnel who develop and code new or modify existing computer applications, software, or specialized utility programs, following software assurance best practices.

DevSecOps Specialist Software/Cloud Architect
Product Designer User Interface (UI) Software Developer
Product Manager Software Test & Evaluation Specialist
Service Designer User Experience (UX) Systems Security Analyst

 

Data/AI:

AI Adoption Specialist Data Architect
AI Innovation Leader Data Officer
AI Risk & Ethics Specialist Data Operations Specialist
AI Test Evaluation Specialist Data Scientist
AI/ML Specialist Data Steward
Data Analyst  

 

BASELINE CERTIFICATIONS

Packed with resources to help you prepare for your certification exam, our learning solutions can be tailored to fit your unique needs. Our offerings include:

  • Study guides and digests
  • Pre and post-assessment questions
  • Test vouchers
  • Certification preparation
  • Program management
  • Post-training support and testing
  • Tracking and reporting


Certification Prep Courses that Align to Multiple Work Roles

SCOR - Implementing and Operating Cisco Security Core Technologies v1.0 CHFI - Computer Hacking Forensic Investigator
CCNP Enterprise CISA - Certified Information Systems Auditor Prep Course  
CCNA - Cisco Certified Network Associate CISM - Certified Information Security Manager Prep Course
Systems Security Certified Practitioner (SSCP) CompTIA A+ Certification Prep
Risk Management Framework (RMF) Implementation 4.0 CompTIA Cloud+
Security+ Certification Prep Course CompTIA CySA+ - Cybersecurity Analyst+ Prep Course
CASP+ - CompTIA Advanced Security Practitioner Prep Course CompTIA Network+ Certification Prep
CISSP Certification Prep Course CND - Certified Network Defender
CEH - Certified Ethical Hacker GIAC® Security Essentials Certification (GSEC)
CyberSec First Responder: Threat Detection and Response GK Polaris Discovery Subscription
CCNP Security Cisco Certified CyberOps Associate
CBRCOR-Performing CyberOps Using Cisco Security Technologies  

 

WE'RE HERE TO HELP

Contact us at Government.US@skillsoft.com to learn more about our DoD cyberspace workforce learning solutions.

Sources:

Elements Map
Factsheet Overview
Cyber Workforce
Marketplace