|
OG-WRL-002 [752]
|
Cybersecurity Policy and Planning |
25 |
34 |
9 |
|
OG-WRL-007 [901]
|
Executive Cybersecurity Leadership |
37 |
45 |
18 |
|
OG-WRL-012 [612]
|
Security Control Assessment |
52 |
132 |
123 |
|
OG-WRL-013 [611]
|
Systems Authorization |
10 |
75 |
18 |
|
OG-WRL-014 [722]
|
Systems Security Management |
76 |
110 |
17 |
|
DD-WRL-003 [621]
|
Secure Software Development |
48 |
89 |
24 |
|
DD-WRL-005 [622]
|
Software Security Assessment |
38 |
86 |
18 |
|
PD-WRL-001 [511]
|
Defensive Cybersecurity |
43 |
125 |
38 |
|
PD-WRL-002 [212]
|
Digital ForensicsĀ |
46 |
94 |
42 |
|
PD-WRL-003 [531]
|
Incident Response |
29 |
55 |
23 |
|
PD-WRL-007 [541]
|
Vulnerability Analysis |
15 |
64 |
18 |
|
IN-WRL-001 [221]
|
Cybercrime Investigation |
30 |
58 |
19 |
|
IN-WRL-002 [211]
|
Digital Evidence Analysis |
52 |
93 |
30 |