๐ผ AT-1 Policy and Procedures | | | | |
๐ผ AT-2 Literacy Training and Awareness | 6 | | | |
ย ย ย ย ๐ผ AT-2(1) Literacy Training and Awareness _ Practical Exercises | | | | |
ย ย ย ย ๐ผ AT-2(2) Literacy Training and Awareness _ Insider Threat | | | | |
ย ย ย ย ๐ผ AT-2(3) Literacy Training and Awareness _ Social Engineering and Mining | | | | |
ย ย ย ย ๐ผ AT-2(4) Literacy Training and Awareness _ Suspicious Communications and Anomalous System Behavior | | | | |
ย ย ย ย ๐ผ AT-2(5) Literacy Training and Awareness _ Advanced Persistent Threat | | | | |
ย ย ย ย ๐ผ AT-2(6) Literacy Training and Awareness _ Cyber Threat Environment | | | | |
๐ผ AT-3 Role-based Training | 5 | | | |
ย ย ย ย ๐ผ AT-3(1) Role-based Training _ Environmental Controls | | | | |
ย ย ย ย ๐ผ AT-3(2) Role-based Training _ Physical Security Controls | | | | |
ย ย ย ย ๐ผ AT-3(3) Role-based Training _ Practical Exercises | | | | |
ย ย ย ย ๐ผ AT-3(4) Role-based Training _ Suspicious Communications and Anomalous System Behavior | | | | |
ย ย ย ย ๐ผ AT-3(5) Role-based Training _ Processing Personally Identifiable Information | | | | |
๐ผ AT-4 Training Records | | | | |
๐ผ AT-5 Contacts with Security Groups and Associations | | | | |
๐ผ AT-6 Training Feedback | | | | |