Codify — Article

Cyber Ready Workforce Act establishes DOL grants for cybersecurity apprenticeships

Creates a competitive Department of Labor grant program to fund workforce intermediaries that build registered cybersecurity apprenticeship pipelines emphasizing industry certifications and support services.

The Brief

The Cyber Ready Workforce Act directs the Secretary of Labor to award competitive grants to ‘‘workforce intermediaries’’ to create, expand, and implement registered apprenticeship programs focused on cybersecurity occupations. Eligible programs must combine technical instruction, on‑the‑job training, and industry‑recognized certifications, and the statute expressly lists a set of accepted certifications and target occupations.

The bill targets supply‑side workforce barriers by funding curriculum development, registration support, employer partnerships, and apprentice support services (transportation, child care, mentorship). It requires a clear funding split for program operations versus outreach and leaves funding open‑ended by authorizing “such sums as may be necessary,” which raises questions about program scale and sustainability for implementers and funders.

At a Glance

What It Does

Creates a competitive grant program within the Department of Labor that awards funds to workforce intermediaries to establish registered apprenticeship programs in cybersecurity. The statute defines eligible program components (technical instruction, workplace training, industry certifications) and prescribes an 85%/15% minimum/maximum split for required activities and allowable outreach.

Who It Affects

Directly affects workforce intermediaries (consortia of employers, community organizations, education institutions, joint labor‑management entities), employers who host apprentices, postsecondary institutions that provide instruction, and prospective apprentices including veterans and underrepresented groups.

Why It Matters

This bill channels federal apprenticeship policy specifically into cybersecurity, ties curricula to the NICE framework and named industry certifications, and funds both employer engagement and apprentice supports — potentially accelerating entry into cyber roles while shaping what counts as acceptable training credentials.

More articles like this one.

A weekly email with all the latest developments on this topic.

Unsubscribe anytime.

What This Bill Actually Does

The statute sets up a competitive grant program run by the Department of Labor. Grants go only to ‘‘workforce intermediaries’’ — entities or partnerships that can include businesses, community organizations, state/local workforce boards, higher education institutions, nonprofits, or joint labor‑management groups.

The program’s stated purpose is to create, implement, or expand registered apprenticeship programs that train people for cybersecurity jobs.

Eligible apprenticeship programs must mix classroom or technical instruction, on‑the‑job learning, and lead to industry‑recognized certifications. The bill explicitly lists several accepted credentials (for example, CompTIA Network+/A+/Security+, Microsoft technician certifications, Certified Ethical Hacker, CISSP, ISACA CSX) but allows other industry‑recognized certificates as well.

It instructs grantees to reference the NICE Cybersecurity Workforce Framework (SP 800‑181) when designing roles, tasks, and curriculum so training aligns to commonly used workforce taxonomies.The statute places tight constraints on how grant money is spent. Workforce intermediaries must use at least 85% of grant funds on program development and delivery activities — completing DOL apprenticeship registration; developing curricula in cooperation with employer partners; helping employers pay for offsite training and course materials; and providing apprentice supports like counseling, mentorship, and assistance with transportation, housing, or child care.

Up to 15% may fund outreach and marketing, including recruiting apprentices (with explicit mention of outreach to underrepresented groups, youth, veterans) and coordinating with other intermediaries and federal investments. Finally, the bill contains an authorization of appropriations phrased as “such sums as may be necessary,” leaving annual funding levels to future appropriations decisions.

The Five Things You Need to Know

1

The bill limits grant recipients to ‘‘workforce intermediaries’’ and lists eligible partners (business/industry groups, community‑based orgs, state/local workforce boards, postsecondary institutions, joint labor‑management partnerships, nonprofits, and institutions of higher education).

2

Grant recipients must spend at least 85% of funds on program development, employer partnership activities, and apprentice support services, and may use no more than 15% on outreach and marketing.

3

The statute enumerates accepted industry certifications (including CompTIA Network+/A+/Security+, Microsoft Windows 10 Technician, Microsoft Certified System Administrator, Certified Network Defender, Certified Ethical Hacker, ISACA CSX, and (ISC)2 CISSP) while permitting other industry‑recognized credentials.

4

Curriculum development must reference the NICE Cybersecurity Workforce Framework (NIST SP 800‑181) to map work roles and tasks to skills and standards for apprenticeship programs.

5

The bill authorizes funding with the open language “such sums as may be necessary,” rather than specifying a dollar amount or formula for grant awards.

Section-by-Section Breakdown

Every bill we cover gets an analysis of its key sections. Expand all ↓

Section 1

Short title

Names the statute the ‘‘Cyber Ready Workforce Act.’' This is the label stakeholders will use when referring to the program in policy correspondence and implementation guidance; it signals the bill’s workforce focus rather than a broader cybersecurity policy agenda.

Section 2

Definitions and eligible applicants

Defines ‘‘registered apprenticeship program’’ by reference to the National Apprenticeship Act and builds a precise working definition of ‘‘workforce intermediary.’' That definition matters because only entities meeting it can receive grants; the statute intentionally permits consortium models that combine employers, education providers, community groups, workforce boards, and labor partners, which encourages multi‑partner proposals but also creates administrative complexity in demonstrating eligibility and fiscal responsibility.

Section 3

Competitive grant authority and program scope

Directs the Secretary of Labor to award grants on a competitive basis to workforce intermediaries to support establishment, implementation, and expansion of cybersecurity registered apprenticeships. It sets program eligibility to include technical instruction, workplace training, and industry certifications and lists example certifications and target occupations. Practically, this section creates the program’s mission and shapes reviewer expectations for grant applications — proposals will need to show alignment to both apprenticeship registration requirements and named credential pathways.

2 more sections
Section 4

Use of funds — required activities and limits

Contains the key spending rules: at least 85% of grant funds must go toward (1) completing apprenticeship registration and technical support, (2) building employer partnerships, developing curricula tied to NICE, and subsidizing offsite training or course materials, and (3) providing apprentice supports (career counseling, mentorship, transportation, housing, child care). Up to 15% may be used for outreach, marketing, recruitment (with emphasis on underrepresented populations), and coordination with other intermediaries and federal investments. These constraints will drive budget templates in applications and will require grantees to track expenditures against narrow functional categories.

Section 5

Authorization of appropriations

Authorizes ‘‘such sums as may be necessary’’ to carry out the Act, rather than specifying a funding level or multi‑year authorization. That open‑ended language leaves program scale, award size, and duration dependent on future appropriations and departmental prioritization, which affects planning for both the Department of Labor and prospective grantees.

At scale

This bill is one of many.

Codify tracks hundreds of bills on Employment across all five countries.

Explore Employment in Codify Search →

Who Benefits and Who Bears the Cost

Every bill creates winners and losers. Here's who stands to gain and who bears the cost.

Who Benefits

  • Prospective apprentices (including veterans, youth, and underrepresented groups) — the bill funds direct support services (transportation, child care, mentorship, counseling) and creates clearer, employer‑aligned pathways into cyber occupations to improve near‑term employment prospects.
  • Employers seeking entry‑level cybersecurity talent — the program subsidizes curriculum development, offsite training costs, and helps connect employers with education providers, lowering the recruitment and training burden for businesses.
  • Community colleges and postsecondary institutions — institutions with registered apprenticeship experience can partner as education providers and receive funds to adapt curricula to NICE roles and industry credentialing, strengthening ties to local employers.
  • Workforce intermediaries and consortia — the statute explicitly funds organizations that coordinate multi‑partner apprenticeship efforts, building capacity and creating revenue streams to sustain intermediary functions.
  • Certification vendors and industry credentialing bodies — the bill’s explicit listing and acceptance of industry‑recognized certifications creates more demand for vendor exams, prep courses, and associated materials.

Who Bears the Cost

  • Department of Labor — the agency must administer competitive grants, vet applicants, monitor compliance with the 85%/15% spending split, and coordinate with existing apprenticeship and workforce programs, creating an administrative burden that requires staff and systems.
  • Employers that host apprentices — while some offsite training costs can be subsidized, employers still bear on‑the‑job training costs, supervision, and potential productivity tradeoffs during apprentices’ learning period.
  • Workforce intermediaries — grantees must manage grant compliance, curricula aligned to NICE, employer relationships, and support services; smaller intermediaries may face upfront administrative costs not fully covered by grants.
  • Federal taxpayers — because the statute authorizes unspecified sums, program expansion depends on appropriations that will require tradeoffs against other budget priorities.
  • Aspiring apprentices who cannot access listed certifications affordably — certification exam fees and prerequisite costs (equipment, software) may create out‑of‑pocket expenses if a grantee does not fully subsidize them.

Key Issues

The Core Tension

The central dilemma is speeding labor market entry into in‑demand cybersecurity roles by funding employer‑aligned, certification‑based apprenticeships versus ensuring that federal dollars support equitable, durable career pathways rather than short, vendor‑driven credentialing that may not guarantee upward mobility or broad technical competency.

The bill ties federal grant dollars to a specific training model that emphasizes industry‑recognized certifications and alignment to the NICE framework. That alignment helps employers but risks narrowing instruction to short‑term credential attainment instead of broader foundational skills or academic pathways.

The effect will depend on how strongly grant reviewers prioritize long‑term career ladders and how grantees balance cert preparation with transferable computer science and problem‑solving skills.

Another practical tension concerns capacity and sustainability. The ‘‘workforce intermediary’’ approach encourages multi‑partner consortia, which can scale faster, but forming and administering such partnerships takes time and resources.

The open authorization language (“such sums as may be necessary”) leaves the program’s scope undefined: small initial appropriations could limit grants to pilot projects, while larger appropriations could require rapid scaling that outstrips intermediary capacity. Finally, the explicit list of acceptable certifications may advantage incumbents who control those credentials and create access barriers (cost, exam prerequisites) for some apprentices unless grantees budget to subsidize exam and materials costs.

Try it yourself.

Ask a question in plain English, or pick a topic below. Results in seconds.