Product roadmap

We hope our roadmap provides valuable insight into future product development at Infosec, but it’s important to note the development and release of all items on this roadmap are subject to change. We encourage you to regularly review and discuss this roadmap with your Infosec Skills client success manager or account representative.

What we're working on

We hope our roadmap provides valuable insight into future product development at Infosec, but it’s important to note the development and release of all items on this roadmap are subject to change. We encourage you to regularly review and discuss this roadmap with your Infosec Skills client success manager or account representative. Our team is here to answer your questions about product direction and, of course, help you submit your own requests for future development consideration.

Infosec Skills product pillars

Ongoing skill development is essential to keep up with technology change and stay ahead of cybercriminals. Infosec Skills makes it easier than ever by focusing on four areas.

Break down barriers to entry for cybersecurity careers

Break down barriers to entry for cybersecurity careers

Anticipate learner needs to deliver hands-on training tailored to roles and learning styles

Anticipate learner needs to deliver hands-on training tailored to roles and learning styles

Prove training value as programs scale

Prove training value as programs scale

Provide role-guided learning & certification preparation

Provide role-guided learning & certification preparation

Break down barriers to entry for cybersecurity careers

Future work

  • New learner experience and updated user interface (UI): We’re enhancing the Infosec Skills UI to improve content discoverability and search, modernize the UI and introduce a cohesive content consumption experience.
  • Gamified learning: We’re adding new ways to engage learners, motivate skill progression and help you get even more value from your training investment. This includes learner goals, shareable badges and awards.
  • Onboarding experience and recommendations: Improved onboarding helps learners quickly discover relevant training content.

Completed

Anticipate learner needs to deliver hands-on training tailored to roles and learning styles

Future work

  • Guided, role-based training: In addition to mapping content to the NICE Framework, we’re also aligning training to 10 popular and in-demand cyber roles. Each role-based training plan includes a combination of foundational training, hands-on training in the cyber range and new, hands-on content every month to help cyber talent stay ahead of emerging threats.
  • Additional NICE mapping: NICE filters help admins and learners discover training targeted to key competencies, knowledge and skill areas.

Completed

  • Training mapped to the NICE Framework: Every Infosec Skills course, cyber range and project now maps directly to specific NICE Framework Knowledge Statements, Skills Statements and Work Roles.

Prove training value as programs scale

Future work

  • Usage reporting and data visualizations: Reporting dashboards provide an at-a-glance view of team training progress.
  • Teams admin assigned training workflow: An improved training workflow helps admins monitor and manage assigned training content across different groups of learners.

Completed

  • Certificates of completion: Custom completion certificates make it easy to share an official record of training progress and earn CPEs.
  • Building out API: Open API allows admins to easily scale and integrate training programs.
  • Training notifications: Training notifications will enable Teams admins to notify learners when new training is assigned, nearing a due date or past due.

Provide role-guided learning & certification preparation

Future content

Penetration Tester

  • Reconnaissance Cyber Range: Get hands-on experience with the most commonly used reconnaissance techniques as outlined in the MITRE ATT&CK® Matrix for Enterprise — includes 13 labs total.
  • Resource Development Cyber Range: Get hands-on experience with creating, purchasing and compromising resources with common resource development techniques as outlined in the MITRE ATT&CK® Matrix for Enterprise — includes 9 labs total.
  • Hands-on Ransomware Mitigation Learning Path: This path will take a hands-on approach to identify and mitigate popular Ransomware.

Secure Coder

  • PCI-DSS for Developers Learning Path: This language-agnostic path will teach best practices for application developers working on applications that have to comply with PCI-DSS requirements.
  • API Security Learning Path: This path will ensure the necessary guidelines and subsequent skills are used when developing APIs.

Security Manager

  • IAPP CIPT Certification Path: This path will teach the topics and domains covered by the IAPP Certifed Information Privacy Technologist (CIPT) certification exam.

Security Engineer

  • SELinux administration Learning Path: This path will explain SELinux and type enforcement concepts.
  • Fundamentals of Zero Trust Learning Path: This path will help you gain insight into Zero Trust Architecture (ZTA) applied at a strategic and tactical level.

ICS Security Practitioner

  • Securing Embedded Systems Learning Path: This path will cover essential security topics focused on securing embedded systems from design to implementation.

Cloud Security Engineer

  • CCSK Certification Path: This path will teach the topics and domains covered by the Certificate of Cloud Security Knowledge exam.

Digital Forensics Analyst

  • IoT Forensics Learning Path: This path will train you to understand IoT-related crime and how to collect and analyze evidence from devices.
  • MacOS Forensics Learning Path: This hands-on path will train you on finding and examining forensic artifacts on Apple computers.
  • Anti-forensics Learning Path: This learning path will cover different anti-forensic techniques that an investigator may encounter, including encryption, steganography, bit shifting and others.

Information Risk Analyst

  • NIST 800-53 Assessments & Audits Learning Path: This path will help you identify the degree of collaboration needed between security and privacy programs with respect to the implementation of controls.