National Cyber Warfare Foundation
Revolutionary advancements in cyber security happen here
Programs and results
What we aim to solve
There is a massive skills gap in cyber security. The problem continues to get worse. Even those receiving some formal training are unprepared for practical work in cyber security.
We are training capable cyber warriors and getting the direct employment with companies and other employment partners. They are happy to utilize the highly capable talent we are producing and are eager for more.
Our programs
What are the organization's current programs, how do they measure success, and who do the programs serve?
Blue Team real world training
Understand and learn how yo defend networks / systems with real world, hands on training.
Red Team real world training
learn how to perform computer network attack (CNA) / red team functions. Develop and refine your skills for all leveal of red team job functions.
Digital Forensics real world training
Understand the process and learn to perform digital forensics. Understand issues relating to technologies, working with law enforcement, and intelligence organizations.
Secure Operations Center (SOC) real world training
Understand and learn the job roles in a real world secure operations center (SOC) environment. Practise these roles in a real world environment.
Where we work
Videos
Our results
How does this organization measure their results? It's a hard question but an important one.
Number of people working at the SME/Coop/Enterprise on a full-time (> 35 hours per week) basis as a result of the nonprofit's efforts
This metric is no longer tracked.Totals By Year
Type of Metric
Outcome - describing the effects on people or issues
Direction of Success
Increasing
Number of competition winners declared
This metric is no longer tracked.Totals By Year
Type of Metric
Output - describing our activities and reach
Direction of Success
Increasing
Number of links and collaborations with external organizations that support student learning and its priority tasks
This metric is no longer tracked.Totals By Year
Type of Metric
Output - describing our activities and reach
Direction of Success
Increasing
Total number of guided tours given
This metric is no longer tracked.Totals By Year
Type of Metric
Output - describing our activities and reach
Direction of Success
Increasing
Number of participants attending course/session/workshop
This metric is no longer tracked.Totals By Year
Type of Metric
Output - describing our activities and reach
Direction of Success
Increasing
Goals & Strategy
Learn about the organization's key goals, strategies, capabilities, and progress.
Charting impact
Four powerful questions that require reflection about what really matters - results.
What is the organization aiming to accomplish?
!) Education. Traing people in practical, real world, skills for computer network attack (CNA), computer network defense (CND), and digital forensics (DF).
2) Gathering data on cyber attacks, malware, Internet of Things (IoT), and hardware attacks. Documenting and reporting new findings to the relevant interested parties.
3) Changing the cyber security inductry. Fostering collaboration, an understanding of the entire cyber security eco-system, and delivering capable talent to companies and other organizations in desperate need of capable cyber warriors.
What are the organization's key strategies for making this happen?
* Real world, hands on training. Learning from a book does not work. Simulators provide false confidence and unprepared talent. Our training material, targets, and culture change all of that quickly and dramatically.
* Interconnection with the entire cyber security eco-system. Nearly everyone has a limited view of the cyber security landscape. We cover the entirety of the cyber security eco-system which results in highly capable talent.
* Collaboration. We foster a culture of collaboration. United we stand also implies divided we fall.
What are the organization's capabilities for doing this?
* Access to real talent with experience. Not certified people, or some professor. Real people who have decades of experience in cyber warfare.
* Strong partnerships. All players work and converge into our ranges. This enables our students to interconnect themselves to everything and everyone relevant to cyber security,
What have they accomplished so far and what's next?
* Full employment. All of our students seeking work are fully employed in the cyber security field of their choice.
* Rapid expansion. We have three locations in Arizona and will be expanding that to 11 within 2 years.
* Expansion to other states. we are in talks to expand to several other states.
Financials
Unlock nonprofit financial insights that will help you make more informed decisions. Try our monthly plan today.
- Analyze a variety of pre-calculated financial metrics
- Access beautifully interactive analysis and comparison tools
- Compare nonprofit financials to similar organizations
Want to see how you can enhance your nonprofit research and unlock more insights?
Learn more
about GuideStar Pro.
Operations
The people, governance practices, and partners that make the organization tick.
Connect with nonprofit leaders
SubscribeBuild relationships with key people who manage and lead nonprofit organizations with GuideStar Pro. Try a low commitment monthly plan today.
- Analyze a variety of pre-calculated financial metrics
- Access beautifully interactive analysis and comparison tools
- Compare nonprofit financials to similar organizations
Want to see how you can enhance your nonprofit research and unlock more insights? Learn More about GuideStar Pro.
Connect with nonprofit leaders
SubscribeBuild relationships with key people who manage and lead nonprofit organizations with GuideStar Pro. Try a low commitment monthly plan today.
- Analyze a variety of pre-calculated financial metrics
- Access beautifully interactive analysis and comparison tools
- Compare nonprofit financials to similar organizations
Want to see how you can enhance your nonprofit research and unlock more insights? Learn More about GuideStar Pro.
National Cyber Warfare Foundation
Board of directorsas of 12/08/2019
Mr. Rich Larkins
Board leadership practices
GuideStar worked with BoardSource, the national leader in nonprofit board leadership and governance, to create this section.
-
Board orientation and education
Does the board conduct a formal orientation for new board members and require all board members to sign a written agreement regarding their roles, responsibilities, and expectations? Yes -
CEO oversight
Has the board conducted a formal, written assessment of the chief executive within the past year ? Yes -
Ethics and transparency
Have the board and senior staff reviewed the conflict-of-interest policy and completed and signed disclosure statements in the past year? Yes -
Board composition
Does the board ensure an inclusive board member recruitment process that results in diversity of thought and leadership? Yes -
Board performance
Has the board conducted a formal, written self-assessment of its performance within the past three years? Yes