CIBERDEFENSA ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR 46 The cyber reserve online model has the following advantages: The cyber reservist does not necessarily have to carryout the activity in the facilities of the assigned unit the individual can take advantage of telecommuting, working from home or the workplace. The cyber reservist does not necessarily have to carryout the activity in the facilities of the assigned unit the individual can take advantage of telecommuting, working from home or the workplace. The cyber reservist can carryout the work with the reservist’s own means, without the need for an official uniform and means, thus freeing the unit from having to supply the standard official provision. The cyber reservist can be assigned to a specific project (based on professional experience) instead of a unit. 254. Despite the fact that the process is based on an online model, the physical link with the unit should not be overlooked and short-term activities (meetings, events, exercises, etc) that require the physical presence of the reservist in the unit facilities or the physical contact with his colleagues must also be carried out to achieve a stronger loyalty to the unit. 255. Assigned activities and tasks must be carefully selected so that they are perceived by the reservists as a contribution to National Defense. Training 256. To cope with the complexity of cyber defense-related activities and the rapid evolution of cyber defense-related technology, cyber force personnel must receive special and continuous training. 257. Cyber defense training is based on a permanent process of individual training, collective training of cyber defense units and awareness at all levels (end users, cyber defense personnel and senior leaders, defined and conducted through specific annual programs based on the training needs of each position and unit. 258. Individual training is aimed at all individuals in the cyber force units in order to provide them with the appropriate skills that enable them to effectively perform the tasks assigned to their position. 259. The cyber force must define the training path of each position, establishing the position- access skills degree and certification (level required to be assigned to a position) and the combat readiness skills degrees and certification (level required to keep the position) that must be achieved in a given period of time. 260. The cyber force must study the percentage of time that each individual must dedicate to regulated training during their workday. Depending on the type of activity, the percentage of time dedicated to training is different, but a 20-60 rule could be considered a reference, that is, all cyber defense personnel must dedicate at least twenty per percent of their time to training and no one can exceed sixty percent. In specific periods, these margins can be exceeded, but at the end of a global calculation (generally related to the duration of the development plan, annual, biennial or five-year) the margins must remain as noted. 261. The individual training program must detail, for each cyber force position, the training path considering all aspects (operational, technical and administrative, all levels (tactical,