{"id":79973,"date":"2023-08-18T12:22:51","date_gmt":"2023-08-18T12:22:51","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=79973"},"modified":"2026-03-18T12:10:11","modified_gmt":"2026-03-18T12:10:11","slug":"what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\/","title":{"rendered":"What is DoD 8140, DoDM 8140, and DoD 8570 Explained: A Comprehensive Guide to Cyber Security Workforce Management for the Department of Defense (DoD) with 28 DCWF Job Roles that Recognize EC-Council Certifications"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"79973\" class=\"elementor elementor-79973\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9f909a0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9f909a0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b396bc1\" data-id=\"b396bc1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7d70a11 elementor-widget elementor-widget-text-editor\" data-id=\"7d70a11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>What are the DoD 8140 and DoDM 8140?<\/h2><p>DoD 8140, or Department of Defense Directive 8140 in combination with DoDM 8140 and DoDI 8140 collectively provide the directive, instruction, and manual that steers the classification and qualification requirements for individuals working in a cyber security capacity within the United States Department of Defense. The three documents collectively accomplish the following objectives:<\/p><ul><li>Establish the DoD-wide mandate for the required qualification of members working in the DoD cyberspace workforce.<\/li><li>Identify members of the DoD cyberspace workforce based on work role(s) of the positions assigned.<\/li><li>Implement policy, assign job role-based responsibilities, and prescribe procedures for the qualification of personnel in the DoD cyberspace workforce.<\/li><\/ul><p>Since 2007, EC-Council has held multiple approved certifications affecting the training and certification of DoD members, globally helping with the qualification and capability development of US Military forces and DoD components.<\/p><h2>Who is affected by DoD 8140?<\/h2><h3>According to Section 1.1 Applicability of the DoDM 8140.03 February 15, 2023 issuance,<\/h3><h4>DoDM 8140.03 applies to the following:<\/h4><ul><li>OSD<\/li><li>Military Departments (including the Coast Guard at all times, including when it is a service in the Department of Homeland Security by agreement with that department)<\/li><li>Office of the Chairman of the Joint Chiefs of Staff (CJCS) and the Joint Staff<\/li><li>Combatant Commands<\/li><li>Office of the Inspector General of the Department of Defense<\/li><li>Defense Agencies<\/li><li>DoD Field Activities<\/li><li>All other organizational entities within the DoD (referred to collectively in this issuance as the \u201cDoD Components\u201d)<\/li><\/ul><p>At a personnel level, the mandate applies to the following:<\/p><ul><li>ALL cyberspace workforce personnel identified in DoDI 8140.02<\/li><li>Service Members<\/li><li>DoD Civilian Employees<\/li><li>Contractors<\/li><li>Foreign Nationals<\/li><\/ul><h2>\u00a0<\/h2><h2>What is the DoD Cyberspace Workforce Framework (DCWF)?<\/h2><p>The DCWF establishes a taxonomy for cyberspace work roles along with their associated responsibilities in the form of tasks, knowledge requirements, and skill requirements. The combination of 8140 and the DCWF establishes the work role requirements and qualification requirements for members of the DoD Cyber Workforce.<\/p><h2>What roles are EC-Council Certifications are approved to qualify?<\/h2><p>DoDM 8140 has established a three-tier classification for industry certifications following basic, intermediate, and advanced level certification approval. As the qualification requirements shift based on the work role assignments, ANAB Accredited Industry certification bodies are reviewed for the alignment of their certification objectives and how they map to individual work role expectations. After rigorous external review, approval is granted and communicated under the 8140 Directive.<\/p><h2>\u00a0<\/h2><h2>EC-Council Training and Certification for the United States Military, Contractors, and Civilians<\/h2><p>For over 25 Years, EC-Council has Trained, Certified, and Empowered critical workforce elements of the United States Military.<\/p><p>28 DCWF Job Roles that Recognize EC-Council Certifications:<\/p><div class=\"table-responsive\"><p>Below DoD job roles updated as on May 27<sup>th<\/sup>\u00a02024.<\/p><table class=\"table1\"><thead><tr><th>EC-Council Certification<\/th><th>DoD 8140 Approved Work Roles<\/th><\/tr><\/thead><tbody><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\" rel=\"noopener\">Certified Ethical Hacker (CEH)<\/a><\/td><td><ul style=\"list-style-type: none;\"><li>111 &#8211; All-Source Analyst<\/li><li>141 &#8211; Warning Analyst<\/li><li>511 &#8211; Cyber Defense Analyst<\/li><li>531 &#8211; Cyber Defense Incident Responder<\/li><li>541 &#8211; Vulnerability Assessment Analyst<\/li><li>661 &#8211; Research &amp; Development Specialist<\/li><\/ul><\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/ceh-master\/\" target=\"_blank\" rel=\"noopener\">CERTIFIED ETHICAL HACKER PRACTICAL (CEH PRACTICAL)<\/a><\/td><td><ul style=\"list-style-type: none;\"><li>111 &#8211; All-Source Analyst<\/li><li>141 &#8211; Warning Analyst<\/li><li>511 &#8211; Cyber Defense Analyst<\/li><li>531 &#8211; Cyber Defense Incident Responder<\/li><li>541 &#8211; Vulnerability Assessment Analyst<\/li><li>661 &#8211; Research &amp; Development Specialist<\/li><\/ul><\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\" rel=\"noopener\">CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)<\/a><\/td><td><ul style=\"list-style-type: none;\"><li>611 &#8211; Authorizing Official\/Designating Representative<\/li><li>722 &#8211; Information Systems Security Manager<\/li><li>723 &#8211; COMSEC Manager<\/li><li>731 &#8211; Cyber Legal Advisor<\/li><li>801 &#8211; Program Manager<\/li><li>802 &#8211; IT Project Manager<\/li><li>803 &#8211; Product Support Manager<\/li><li>804 &#8211; IT Investment\/Portfolio Manager<\/li><li>805 &#8211; IT Program Auditor<\/li><\/ul><\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-chfi\/\" target=\"_blank\" rel=\"noopener\">COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI)<\/a><\/td><td><ul style=\"list-style-type: none;\"><li>211 &#8211; Forensics Analyst<\/li><li>212 &#8211; Cyber Defense Forensics Analyst<\/li><li>221 &#8211; Cyber Crime Investigator<\/li><\/ul><\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\" rel=\"noopener\">CERTIFIED NETWORK DEFENDER (CND)<\/a><\/td><td><ul style=\"list-style-type: none;\"><li>511 &#8211; Cyber Defense Analyst<\/li><li>521 &#8211; Cyber Defense Infrastructure Support Specialist<\/li><li>531 &#8211; Cyber Defense Incident Responder<\/li><\/ul><\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-incident-handler-ecih\" target=\"_blank\" rel=\"noopener\">EC-COUNCIL CERTIFIED INCIDENT HANDLER (ECIH)<\/a><\/td><td><ul style=\"list-style-type: none;\"><li>531 \u2013 Cyber Defense Incident Responder<\/li><\/ul><\/td><\/tr><\/tbody><\/table><\/div><p>CND &#8211; <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\" rel=\"noopener\">Certified Network Defender<\/a><\/p><p>CEH &#8211; <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\" rel=\"noopener\">Certified Ethical Hacker<\/a><\/p><p>CHFI &#8211; <a href=\"https:\/\/www.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-chfi\/\" target=\"_blank\" rel=\"noopener\">Computer Hacking Forensic Investigator<\/a><\/p><p>CCISO &#8211; <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\" rel=\"noopener\">Certified Chief Information Security Officer<\/a><\/p><h2>What is\/was DoD 8570?<\/h2><p>DoD 8570 has been replaced by DoD 8140. The former 8570 Directive provided similar mandates on qualifying the DoD Cyber Workforce; however, the classification of work roles was based on work role specialty areas as opposed to the individual work role itself. These classifications are still relevant.<\/p><p><span style=\"color: var(--the7-h2-color); letter-spacing: var(--the7-h2-letter-spacing); text-transform: var(--the7-h2-text-transform); word-spacing: var(--the7-h2-word-spacing);\">\u00a0<\/span><\/p><h2>Approved Baseline Certifications*<\/h2><div class=\"table-responsive\"><table class=\"table1\"><tbody><tr><td>IAT Level I<sup>2<\/sup><\/td><td>IAT Level II<sup>2<\/sup><\/td><td>IAT Level III<\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\" rel=\"noopener\">CND<\/a><\/td><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\" rel=\"noopener\">CND<\/a><\/td><\/tr><tr><td>IAM Level I<\/td><td>IAM Level II<\/td><td>IAM Level III<\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\" rel=\"noopener\">CND<\/a><\/td><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\" rel=\"noopener\">CCISO<\/a><\/td><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\" rel=\"noopener\">CCISO<\/a><\/td><\/tr><tr><td>IASAE I<\/td><td>IASAE I<\/td><td>IASAE III<\/td><\/tr><tr><td>CSSP Analyst<sup>1, 2<\/sup><\/td><td>CSSP Infrastructure Support<sup>1<\/sup><\/td><td>CSSP Incident Responder<sup>1, 2<\/sup><\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\" rel=\"noopener\">CEH<\/a><\/td><td><p><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\" rel=\"noopener\">CEH<\/a><\/p><p><a href=\"https:\/\/www.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-chfi\/\" target=\"_blank\" rel=\"noopener\">CHFI<\/a><\/p><p><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\" rel=\"noopener\">CND<\/a><\/p><\/td><td><p><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\" rel=\"noopener\">CEH<\/a><\/p><p><a href=\"https:\/\/www.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-chfi\/\" target=\"_blank\" rel=\"noopener\">CHFI<\/a><\/p><\/td><\/tr><tr><td>CSSP Auditor<sup>1<\/sup><\/td><td>CSSP Manager<sup>1<\/sup><\/td><td>\u00a0<\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\" rel=\"noopener\">CEH<\/a><\/td><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\" rel=\"noopener\">CCISO<\/a><\/td><td>\u00a0<\/td><\/tr><\/tbody><\/table><\/div><p>*DoD Approved Baseline Certifications are not limited to EC-Council Certifications. Refer to the DoD Cyber Exchange for a list of all recognized baseline certifications.<\/p><h3>Need compliance help?<\/h3><p>Reach out to EC-Council\u2019s Government Team and learn more about how EC-Council Certifications can help you, in compliance with DoD 8140<\/p><p>Visit to find more details and speak to our career advisor: <a href=\"https:\/\/www.eccouncil.org\/government-cybersecurity-military-solutions\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.eccouncil.org\/government-cybersecurity-military-solutions\/<\/a><\/p><h2>How to Get Popular EC-Council DOD 8140 Certifications<\/h2><p>Here is a summary of all of the popular EC-Council certifications that are part of the DoD 8140 Directive:<\/p><p>CEH &#8211; Certified Ethical Hacker<\/p><p>EC-Council\u2019s CEH is the world&#8217;s leading ethical hacking credential, equipping cyber security professionals to protect organizations against cyber-attacks. Certified Ethical Hackers follow a 5-phase approach (Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks) to lawfully break into organizations and identify weaknesses and vulnerabilities. The unique learn-certify-engage-compete framework includes training, certification, and real ethical hacking engagements in EC-Council\u2019s live cyber range. Global Ethical Hacking Competitions help participants keep their skills up to date even years after certification. The CEH is a highly sought-after certification, preparing candidates for lucrative cyber security roles with top companies.<\/p><p><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\" rel=\"noopener\">Click here<\/a> to learn more about the CEH , complete the form, and speak to a career advisor.<\/p><p class=\"x_MsoNormal\">CEH \u2013 Certified Ethical Hacker (Practical Exam)<\/p><p class=\"x_p1\">The Certified Ethical Hacker (CEH) Practical Exam is an advanced exam for cybersecurity professionals focusing on practical ethical hacking skills. Test candidates in real-world scenarios that require the use of tools and techniques to identify vulnerabilities. This exam validates your skills in conducting effective penetration tests and implementing robust security measures. Successful completion confirms your skills in defending organization to against cyber threats.<\/p><p><a href=\"https:\/\/www.eccouncil.org\/train-certify\/ceh-master\/\" target=\"_blank\" rel=\"noopener\" data-auth=\"NotApplicable\" data-linkindex=\"7\">Click here\u00a0<\/a>to learn more about the CEH , complete the form, and speak to a career advisor.<\/p><p>CND &#8211; Certified Network Defender<\/p><p>CND Program: EC-Council&#8217;s Certified Network Defender (CND) is a network security certification that provides students with essential skills to safeguard networks, analyze computing systems, and strengthen IT infrastructure. Certified Network Defenders are equipped to apply defense and countermeasure strategies, covering attack prevention, detection, response, and remediation techniques. Hands-on learning with over 80 complex labs enriches their experience throughout this lab-intensive program.<\/p><p><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\" rel=\"noopener\">Click here<\/a> to learn more about CND , complete the form, and speak to a career advisor.<\/p><p>CHFI &#8211; Computer Hacking Forensic Investigator<\/p><p>EC-Council&#8217;s CHFI program is a lab-based training that equips cyber security professionals with knowledge and skills to prepare their organizations for forensic readiness. This intensive 5-day program immerses students in groundbreaking digital forensics technologies, with hands-on experience through 50+ forensic labs. The training covers forensics processes, lab and evidence handling procedures, as well as various forensic investigation techniques.<\/p><p><a href=\"https:\/\/www.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-chfi\/\" target=\"_blank\" rel=\"noopener\">Click here<\/a> to learn more about the CHFI , complete the form, and speak to a career advisor.<\/p><p>CCISO &#8211; Certified Chief Information Security Officer<\/p><p>EC-Council&#8217;s Chief Certified Information Security Officer (CCISO) program is a top-tier certification that propels infosec professionals into C-suite roles. Covering five comprehensive domains, the CCISO bridges the gap between technical, executive management, and financial functions, enabling a seamless transition to management roles. Certified CISOs gain a top-level perspective, excelling in planning, strategizing, and executing information security portfolios. They acquire leadership skills and business acumen to succeed in the highest positions within information security.<\/p><p><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\" rel=\"noopener\">Click here<\/a> to learn more about CCISO, complete the form, and speak to a career advisor.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0fee9b4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0fee9b4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7570482\" data-id=\"7570482\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0f71448 elementor-widget elementor-widget-heading\" data-id=\"0f71448\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQs<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5252b5c elementor-widget elementor-widget-accordion\" data-id=\"5252b5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8631\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-8631\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Where can I find the official 8140 Directive? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8631\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-8631\">We recommend searching for the latest revision of the directive at the Washington Headquarters Services here: https:\/\/www.esd.whs.mil\/DD\/ <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8632\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-8632\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Are certifications that are mapped to DoD DCWF work roles relevant outside of the military? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8632\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-8632\">Yes! The US Department of Labor provides a Crosswalk tool that translates DoD Job Billets from the DCWF to common job titles found in industry and the private sector here: https:\/\/www.onetonline.org\/crosswalk\/MOC\/ <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8633\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-8633\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Why are there four certifications from EC-Council on the directive? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8633\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-8633\">Approval of certifications to the DCWF work roles requires a specific minimum accreditation and alignment. All certifications must be ANAB 17024 Accredited, and the exam domains must align to at least 70% of the DCWF work role responsibilities. EC-Council has worked with the DoD to review the C|ND, C|EH , C|HFI , and C|CISO  certifications due to their close alignment with the expectations in each work role and received the appropriate approval from the DoD to be listed in the directive. <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8634\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-8634\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Will more EC-Council Certifications be added to the 8140 Directive? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8634\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-8634\">We cannot guarantee approval from the DoD; however, EC-Council does have multiple additional certifications that align closely to the work role expectations. Some are already ANAB accredited and others are in the process of review. EC-Council Leadership will continue to work with the DoD on the review, and we hope for approval of these programs to add more tactical cyber security certification options for members of the defense and intelligence communities. <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8635\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-8635\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Is the DCWF the same thing as NICE? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8635\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-8635\">No, but there are many similarities and shared definitions. The Defense Cyber Workforce Framework is under the United Stated Department of Defense, while the National Initiative for Cybersecurity Education (NICE) is run by the National Institute of Science and Technology (NIST). Both initiatives share many common job roles, as well as their corresponding task, knowledge, and skill requirements. EC-Council programs are both approved by the United States Department of Defense and mapped to the NICE Framework. A complete mapping to the NICE framework is available <a href=\"https:\/\/niccs.cisa.gov\/workforce-development\/nice-framework\" rel=\"noopener\" target=\"_blank\">here<\/a>. <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8636\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-8636\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Are there funding options for EC-Council certifications? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8636\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-8636\">Yes! There are a variety of funding options available for active duty, veterans, and civilians alike. EC-Council programs are mapped to the various service COOL programs with over 380 job billets across the various military branches as well as ARMY Ignited. Many certifications are also Post 9\/11 GI Bill approved for reimbursement. EC-Council works closely with delivery partners across the globe to extend opportunities in funding for transitioning military, VetTech, and vocational rehab programs, as well as flexible financing options for training and certification. Reach out to our team to find out more information on funding options. <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8637\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-8637\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How can I find EC-Council certifications in NAVY COOL? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8637\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-8637\">You can find the Advanced Credential search in NAVY COOL here: <a href=\"https:\/\/www.cool.osd.mil\/usn\/credsearch\/index.html\" rel=\"noopener\" target=\"_blank\">https:\/\/www.cool.osd.mil\/usn\/credsearch\/index.html<\/a>. With this tool, you can search by agency under our official company name (International Council of E-Commerce Consultants, Inc. [EC-Council]) to find a list of all approved certifications and their corresponding funding options and job billets. <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8638\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-8638\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How can I find EC-Council certifications in ARMY COOL? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8638\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-8638\">You can find the Advanced Credential search in ARMY COOL here: <a href=\"https:\/\/www.cool.osd.mil\/army\/credsearch\/index.html\" rel=\"noopener\" target=\"_blank\">https:\/\/www.cool.osd.mil\/army\/credsearch\/index.html<\/a>. With this tool, you can search by agency under our official company name (International Council of E-Commerce Consultants, Inc. [EC-Council]) to find a list of all approved certifications and their corresponding funding options and job billets. <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8639\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-8639\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is ARMY IGNITED? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8639\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-8639\">INGITED provides funding opportunities for active-duty soldiers in the US Army. With tuition assistance funding available to all US Army soldiers, EC-Council has a variety of approved training and certification programs in your IGNITED benefits. Visit <a href=\"https:\/\/www.armyignited.army.mil\/student\/public\/education-benefits\" rel=\"noopener\" target=\"_blank\">https:\/\/www.armyignited.army.mil\/student\/public\/education-benefits<\/a> for more information or to apply for fully paid training and certification opportunities. <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-86310\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-86310\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How does EC-Council work with the United States military? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-86310\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-86310\">At EC-Council we take great pride in a long history of working with our nation\u2019s military to equip and enhance cyber capability. In addition to providing training and certification to members of our armed forces, EC-Council&#8217;s Authorized Partner Network provides access to training centers in over 140 countries, serving members of our military, whether they are stationed home or abroad. We provide various online asynchronous and online live options as well as the ability to hold private dedicated classes in unclassified or classified facilities utilizing our large network of Certified EC-Council Instructors. EC-Council also works directly with various military schoolhouses to provide authorized training delivered by the military to the military, essentially &#8220;teaching in green.&#8221; <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-86311\" class=\"elementor-tab-title\" data-tab=\"11\" role=\"button\" aria-controls=\"elementor-tab-content-86311\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">I am in the US Military. How can I find training for EC-Council Certifications? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-86311\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"region\" aria-labelledby=\"elementor-tab-title-86311\"><p>If you are a member of the armed forces in almost any capacity, your specific service components have provisions for you to receive training and credentialing. Often the service will pay for both MOS\/AFSC related and non-related training programs. These benefit programs differ by service and generally come under the heading of each service\u2019s COOL program. Contact us to find out what you\u2019re eligible for.<\/p>\n<p>Visit for more details <a href=\"https:\/\/iclass.eccouncil.org\/military-solutions\/\" target=\"_blank\" rel=\"noopener\">https:\/\/iclass.eccouncil.org\/military-solutions\/<\/a><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-86312\" class=\"elementor-tab-title\" data-tab=\"12\" role=\"button\" aria-controls=\"elementor-tab-content-86312\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">I am an educator. How does EC-Council help NSA - CAE Schools? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-86312\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"12\" role=\"region\" aria-labelledby=\"elementor-tab-title-86312\">Dating back to the early 2000s, EC-Council started by mapping our programs to the NSTISSI and CNSS Standards 4011 through 4019. With the evolution of the NICE Framework in recent years, EC-Council has worked diligently to map its programs to the specialty areas and now competency areas of the National Initiative in Cybersecurity Education. We have helped a variety of schools with program development and curriculum mapping into the National Security Agencies Centers for Academic Excellence. Awarded the Industrial Achievement Award by CISSE, EC-Council helps accredited universities achieve CAE status through well-aligned ANAB and ACE Accredited programs. Learn more about our Academic Partnerships and our CAE program here: <a href=\"https:\/\/www.eccouncil.org\/academia\/caebenefits\/\" rel=\"noopener\" target=\"_blank\">https:\/\/www.eccouncil.org\/academia\/caebenefits\/<\/a> <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-86313\" class=\"elementor-tab-title\" data-tab=\"13\" role=\"button\" aria-controls=\"elementor-tab-content-86313\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How can I find out more about partnering with EC-Council? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-86313\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"13\" role=\"region\" aria-labelledby=\"elementor-tab-title-86313\"><p>Reach out here to our military team for more information.<\/p>\n<p>Visit for more details <a href=\"https:\/\/iclass.eccouncil.org\/military-solutions\/\" target=\"_blank\" rel=\"noopener\">https:\/\/iclass.eccouncil.org\/military-solutions\/<\/a><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"Where can I find the official 8140 Directive?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"We recommend searching for the latest revision of the directive at the Washington Headquarters Services here: https:\\\/\\\/www.esd.whs.mil\\\/DD\\\/ \"}},{\"@type\":\"Question\",\"name\":\"Are certifications that are mapped to DoD DCWF work roles relevant outside of the military?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Yes! The US Department of Labor provides a Crosswalk tool that translates DoD Job Billets from the DCWF to common job titles found in industry and the private sector here: https:\\\/\\\/www.onetonline.org\\\/crosswalk\\\/MOC\\\/ \"}},{\"@type\":\"Question\",\"name\":\"Why are there four certifications from EC-Council on the directive?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Approval of certifications to the DCWF work roles requires a specific minimum accreditation and alignment. All certifications must be ANAB 17024 Accredited, and the exam domains must align to at least 70% of the DCWF work role responsibilities. EC-Council has worked with the DoD to review the C|ND, C|EH , C|HFI , and C|CISO  certifications due to their close alignment with the expectations in each work role and received the appropriate approval from the DoD to be listed in the directive. \"}},{\"@type\":\"Question\",\"name\":\"Will more EC-Council Certifications be added to the 8140 Directive?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"We cannot guarantee approval from the DoD; however, EC-Council does have multiple additional certifications that align closely to the work role expectations. Some are already ANAB accredited and others are in the process of review. EC-Council Leadership will continue to work with the DoD on the review, and we hope for approval of these programs to add more tactical cyber security certification options for members of the defense and intelligence communities. \"}},{\"@type\":\"Question\",\"name\":\"Is the DCWF the same thing as NICE?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"No, but there are many similarities and shared definitions. The Defense Cyber Workforce Framework is under the United Stated Department of Defense, while the National Initiative for Cybersecurity Education (NICE) is run by the National Institute of Science and Technology (NIST). Both initiatives share many common job roles, as well as their corresponding task, knowledge, and skill requirements. EC-Council programs are both approved by the United States Department of Defense and mapped to the NICE Framework. A complete mapping to the NICE framework is available <a href=\\\"https:\\\/\\\/niccs.cisa.gov\\\/workforce-development\\\/nice-framework\\\" rel=\\\"noopener\\\" target=\\\"_blank\\\">here<\\\/a>. \"}},{\"@type\":\"Question\",\"name\":\"Are there funding options for EC-Council certifications?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Yes! There are a variety of funding options available for active duty, veterans, and civilians alike. EC-Council programs are mapped to the various service COOL programs with over 380 job billets across the various military branches as well as ARMY Ignited. Many certifications are also Post 9\\\/11 GI Bill approved for reimbursement. EC-Council works closely with delivery partners across the globe to extend opportunities in funding for transitioning military, VetTech, and vocational rehab programs, as well as flexible financing options for training and certification. Reach out to our team to find out more information on funding options. \"}},{\"@type\":\"Question\",\"name\":\"How can I find EC-Council certifications in NAVY COOL?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"You can find the Advanced Credential search in NAVY COOL here: <a href=\\\"https:\\\/\\\/www.cool.osd.mil\\\/usn\\\/credsearch\\\/index.html\\\" rel=\\\"noopener\\\" target=\\\"_blank\\\">https:\\\/\\\/www.cool.osd.mil\\\/usn\\\/credsearch\\\/index.html<\\\/a>. With this tool, you can search by agency under our official company name (International Council of E-Commerce Consultants, Inc. [EC-Council]) to find a list of all approved certifications and their corresponding funding options and job billets. \"}},{\"@type\":\"Question\",\"name\":\"How can I find EC-Council certifications in ARMY COOL?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"You can find the Advanced Credential search in ARMY COOL here: <a href=\\\"https:\\\/\\\/www.cool.osd.mil\\\/army\\\/credsearch\\\/index.html\\\" rel=\\\"noopener\\\" target=\\\"_blank\\\">https:\\\/\\\/www.cool.osd.mil\\\/army\\\/credsearch\\\/index.html<\\\/a>. With this tool, you can search by agency under our official company name (International Council of E-Commerce Consultants, Inc. [EC-Council]) to find a list of all approved certifications and their corresponding funding options and job billets. \"}},{\"@type\":\"Question\",\"name\":\"What is ARMY IGNITED?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"INGITED provides funding opportunities for active-duty soldiers in the US Army. With tuition assistance funding available to all US Army soldiers, EC-Council has a variety of approved training and certification programs in your IGNITED benefits. Visit <a href=\\\"https:\\\/\\\/www.armyignited.army.mil\\\/student\\\/public\\\/education-benefits\\\" rel=\\\"noopener\\\" target=\\\"_blank\\\">https:\\\/\\\/www.armyignited.army.mil\\\/student\\\/public\\\/education-benefits<\\\/a> for more information or to apply for fully paid training and certification opportunities. \"}},{\"@type\":\"Question\",\"name\":\"How does EC-Council work with the United States military?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"At EC-Council we take great pride in a long history of working with our nation\\u2019s military to equip and enhance cyber capability. In addition to providing training and certification to members of our armed forces, EC-Council&#8217;s Authorized Partner Network provides access to training centers in over 140 countries, serving members of our military, whether they are stationed home or abroad. We provide various online asynchronous and online live options as well as the ability to hold private dedicated classes in unclassified or classified facilities utilizing our large network of Certified EC-Council Instructors. EC-Council also works directly with various military schoolhouses to provide authorized training delivered by the military to the military, essentially &#8220;teaching in green.&#8221; \"}},{\"@type\":\"Question\",\"name\":\"I am in the US Military. How can I find training for EC-Council Certifications?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>If you are a member of the armed forces in almost any capacity, your specific service components have provisions for you to receive training and credentialing. Often the service will pay for both MOS\\\/AFSC related and non-related training programs. These benefit programs differ by service and generally come under the heading of each service\\u2019s COOL program. Contact us to find out what you\\u2019re eligible for.<\\\/p>\\n<p>Visit for more details <a href=\\\"https:\\\/\\\/iclass.eccouncil.org\\\/military-solutions\\\/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">https:\\\/\\\/iclass.eccouncil.org\\\/military-solutions\\\/<\\\/a><\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"I am an educator. How does EC-Council help NSA - CAE Schools?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Dating back to the early 2000s, EC-Council started by mapping our programs to the NSTISSI and CNSS Standards 4011 through 4019. With the evolution of the NICE Framework in recent years, EC-Council has worked diligently to map its programs to the specialty areas and now competency areas of the National Initiative in Cybersecurity Education. We have helped a variety of schools with program development and curriculum mapping into the National Security Agencies Centers for Academic Excellence. Awarded the Industrial Achievement Award by CISSE, EC-Council helps accredited universities achieve CAE status through well-aligned ANAB and ACE Accredited programs. Learn more about our Academic Partnerships and our CAE program here: <a href=\\\"https:\\\/\\\/www.eccouncil.org\\\/academia\\\/caebenefits\\\/\\\" rel=\\\"noopener\\\" target=\\\"_blank\\\">https:\\\/\\\/www.eccouncil.org\\\/academia\\\/caebenefits\\\/<\\\/a> \"}},{\"@type\":\"Question\",\"name\":\"How can I find out more about partnering with EC-Council?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Reach out here to our military team for more information.<\\\/p>\\n<p>Visit for more details <a href=\\\"https:\\\/\\\/iclass.eccouncil.org\\\/military-solutions\\\/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">https:\\\/\\\/iclass.eccouncil.org\\\/military-solutions\\\/<\\\/a><\\\/p>\"}}]}<\/script>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What are the DoD 8140 and DoDM 8140? DoD 8140, or Department of Defense Directive 8140 in combination with DoDM 8140 and DoDI 8140 collectively provide the directive, instruction, and manual that steers the classification and qualification requirements for individuals working in a cyber security capacity within the United States Department of Defense. The three&hellip;<\/p>\n","protected":false},"author":33,"featured_media":80033,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12083],"tags":[],"class_list":{"0":"post-79973","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ethical-hacking"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What Is DoD 8140 &amp; DoDM 8140: Cyber Security Workforce with Roles &amp; Certifications<\/title>\n<meta name=\"description\" content=\"Explore DoD 8140, DoDM 8140 and DoD 8570 in-depth. Learn about cyber security workforce management for Department of Defense (DoD) directive, including 31 DCWF job roles and EC-Council certifications.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is DoD 8140, DoDM 8140, and DoD 8570 Explained: A Comprehensive Guide to Cyber Security Workforce Management for the Department of Defense (DoD) with 28 DCWF Job Roles that Recognize EC-Council Certifications\" \/>\n<meta property=\"og:description\" content=\"Explore DoD 8140, DoDM 8140 and DoD 8570 in-depth. Learn about cyber security workforce management for Department of Defense (DoD) directive, including 31 DCWF job roles and EC-Council certifications.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-18T12:22:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-18T12:10:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/CEH_What-is-DoD-8140-DoDM-8140-and-DoD-8570-Explained.png\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\"},\"headline\":\"What is DoD 8140, DoDM 8140, and DoD 8570 Explained: A Comprehensive Guide to Cyber Security Workforce Management for the Department of Defense (DoD) with 28 DCWF Job Roles that Recognize EC-Council Certifications\",\"datePublished\":\"2023-08-18T12:22:51+00:00\",\"dateModified\":\"2026-03-18T12:10:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\\\/\"},\"wordCount\":2291,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/What-is-DoD-8140-DoDM-8140-and-DoD-8570-Explained-A-Comprehensive-Guide-to-Cyber-Security-Workforce-Management.jpg\",\"articleSection\":[\"Ethical Hacking\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\\\/\",\"name\":\"What Is DoD 8140 & DoDM 8140: Cyber Security Workforce with Roles & Certifications\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/What-is-DoD-8140-DoDM-8140-and-DoD-8570-Explained-A-Comprehensive-Guide-to-Cyber-Security-Workforce-Management.jpg\",\"datePublished\":\"2023-08-18T12:22:51+00:00\",\"dateModified\":\"2026-03-18T12:10:11+00:00\",\"description\":\"Explore DoD 8140, DoDM 8140 and DoD 8570 in-depth. Learn about cyber security workforce management for Department of Defense (DoD) directive, including 31 DCWF job roles and EC-Council certifications.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/What-is-DoD-8140-DoDM-8140-and-DoD-8570-Explained-A-Comprehensive-Guide-to-Cyber-Security-Workforce-Management.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/What-is-DoD-8140-DoDM-8140-and-DoD-8570-Explained-A-Comprehensive-Guide-to-Cyber-Security-Workforce-Management.jpg\",\"width\":521,\"height\":521},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ethical Hacking\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"What is DoD 8140, DoDM 8140, and DoD 8570 Explained: A Comprehensive Guide to Cyber Security Workforce Management for the Department of Defense (DoD) with 28 DCWF Job Roles that Recognize EC-Council Certifications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Is DoD 8140 & DoDM 8140: Cyber Security Workforce with Roles & Certifications","description":"Explore DoD 8140, DoDM 8140 and DoD 8570 in-depth. Learn about cyber security workforce management for Department of Defense (DoD) directive, including 31 DCWF job roles and EC-Council certifications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\/","og_locale":"en_US","og_type":"article","og_title":"What is DoD 8140, DoDM 8140, and DoD 8570 Explained: A Comprehensive Guide to Cyber Security Workforce Management for the Department of Defense (DoD) with 28 DCWF Job Roles that Recognize EC-Council Certifications","og_description":"Explore DoD 8140, DoDM 8140 and DoD 8570 in-depth. Learn about cyber security workforce management for Department of Defense (DoD) directive, including 31 DCWF job roles and EC-Council certifications.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-08-18T12:22:51+00:00","article_modified_time":"2026-03-18T12:10:11+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/CEH_What-is-DoD-8140-DoDM-8140-and-DoD-8570-Explained.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd"},"headline":"What is DoD 8140, DoDM 8140, and DoD 8570 Explained: A Comprehensive Guide to Cyber Security Workforce Management for the Department of Defense (DoD) with 28 DCWF Job Roles that Recognize EC-Council Certifications","datePublished":"2023-08-18T12:22:51+00:00","dateModified":"2026-03-18T12:10:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\/"},"wordCount":2291,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/What-is-DoD-8140-DoDM-8140-and-DoD-8570-Explained-A-Comprehensive-Guide-to-Cyber-Security-Workforce-Management.jpg","articleSection":["Ethical Hacking"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\/","name":"What Is DoD 8140 & DoDM 8140: Cyber Security Workforce with Roles & Certifications","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/What-is-DoD-8140-DoDM-8140-and-DoD-8570-Explained-A-Comprehensive-Guide-to-Cyber-Security-Workforce-Management.jpg","datePublished":"2023-08-18T12:22:51+00:00","dateModified":"2026-03-18T12:10:11+00:00","description":"Explore DoD 8140, DoDM 8140 and DoD 8570 in-depth. Learn about cyber security workforce management for Department of Defense (DoD) directive, including 31 DCWF job roles and EC-Council certifications.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/What-is-DoD-8140-DoDM-8140-and-DoD-8570-Explained-A-Comprehensive-Guide-to-Cyber-Security-Workforce-Management.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/What-is-DoD-8140-DoDM-8140-and-DoD-8570-Explained-A-Comprehensive-Guide-to-Cyber-Security-Workforce-Management.jpg","width":521,"height":521},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-dod-8140-dodm-8140-and-dod-8570-cyber-security-workforce-with-roles-eccouncil-certifications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Ethical Hacking","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/"},{"@type":"ListItem","position":4,"name":"What is DoD 8140, DoDM 8140, and DoD 8570 Explained: A Comprehensive Guide to Cyber Security Workforce Management for the Department of Defense (DoD) with 28 DCWF Job Roles that Recognize EC-Council Certifications"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=79973"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79973\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/80033"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=79973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=79973"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=79973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}