Cookie Preferences

We use cookies to enhance your browsing experience, analyze site traffic, and personalize content. By clicking "Accept All", you consent to our use of cookies. See our Privacy Policy for more information.

Competency Map

From Foundations to Mastery

A structured guide connecting artifacts, frameworks, and courses across five competency domains. Each domain maps Dr. Nsoh's research outputs to actionable learning paths for practitioners, researchers, and students.

Every artifact follows the A-DSRM lifecycle. Every framework operationalizes identity-first security. Every course builds toward deployable competency.

How to Navigate

Students
Start with courses in your domain of interest. Follow the learning path from foundational to advanced, then explore the linked artifacts to see how theory becomes deployable systems.
Practitioners
Begin with the artifact most relevant to your operational challenge. Use the framework connections to understand governance context, then reference courses for deeper skill development.
Researchers
Start with A-DSRM methodology, then explore how each artifact instantiates the methodology. Cross-domain connections reveal research gaps and collaboration opportunities.

Competency Domains

Five interconnected domains spanning identity governance, AI security, critical infrastructure, security operations, and research methodology.

Identity & Access Governance

Master identity-centric security architectures where AuthN, AuthZ, and continuous verification form the foundational control plane for all systems—human, machine, and AI agent.

AI Agent Security & Governance

Develop expertise in governing autonomous AI agents through identity-scoped controls, bounded autonomy, and continuous verification—ensuring AI systems operate within defined safety envelopes.

Critical Infrastructure Resilience

Build competency in securing cyber-physical systems—transportation, energy, and public safety—where identity verification, anomaly detection, and operational continuity are non-negotiable.

Security Operations & Automation

Develop operational excellence in GRC platform management, security metrics, KPI dashboards, and identity-governed automation using Python, PowerShell, and CI/CD pipelines.

Courses & Learning Path

Recommended Progression
  1. 1Start with CIS 3351 for SOC fundamentals and incident response
  2. 2Study CYBER-AUTOMATE for GRC integration and automation patterns
  3. 3Explore the AAO-Defender role for AI-augmented operations
  4. 4Take CIS 4339 to develop security leadership and metrics capabilities

Research Methodology & Artifact Design

Master the Agile Design Science Research Methodology (A-DSRM) for building, evaluating, and iterating security artifacts that operate under real-world constraints and adversarial conditions.

Courses & Learning Path

Recommended Progression
  1. 1Begin with the A-DSRM methodology artifact for theoretical foundations
  2. 2Take CIS 4339 for hands-on research methodology practice
  3. 3Explore A-DSRM Suite for tooling and workflow automation
  4. 4Study the AAO-Architect role for system-level design competency

Cross-Domain Connections

These domains are not silos. The following connections show how artifacts and frameworks bridge competency areas, enabling holistic security practice.

Identity & Access GovernanceAI Agent Security

ICACC Framework bridges IAM controls to AI agent governance

AI Agent SecurityCritical Infrastructure

AI-SECURE-STACK governs AI pipelines deployed in critical systems

Security OperationsIdentity & Access Governance

CYBER-AUTOMATE enforces identity-governed automation across GRC

Research MethodologyAll Domains

A-DSRM provides the iterative evaluation framework for every artifact

Critical InfrastructureSecurity Operations

SOC automation patterns from CYBER-AUTOMATE apply to OT monitoring

Quick Reference Matrix

DomainKey ArtifactsFrameworksEntry CourseAdvanced Course
Identity & Access GovernanceSVX-AD, AEGIS-M, ICACCICACC FrameworkCIS 3337CIS 6358
AI Agent Security & GovernanceAI-SECURE-STACK, ICACCAAO Framework, ICACC FrameworkCIS 4339CIS 6358
Critical Infrastructure ResilienceSVX-AD, AEGIS-M, PRAETORIAN-QICACC FrameworkCIS 3351CIS 6358
Security Operations & AutomationCYBER-AUTOMATE, A-DSRM SuiteAAO FrameworkCIS 3351CIS 4339
Research Methodology & Artifact DesignA-DSRM, A-DSRM SuiteAAO FrameworkCIS 4339CIS 6358

Ready to Begin?

Whether you are a student entering cybersecurity, a practitioner deepening your IAM expertise, or a researcher building the next security artifact—there is a path mapped for you.