Implementing the NIST Cybersecurity Framework CSF

A practitioner’s guide to using the NIST Cybersecurity Framework (CSF) to protect your business or organization
Implementing the NIST Cybersecurity Framework CSF
File Size :
2.55 GB
Total length :
3h 18m

Category

Instructor

Jason Dion • 1 Million+ Enrollments Worldwide

Language

Last update

2/2022

Ratings

4.5/5

Implementing the NIST Cybersecurity Framework CSF

What you’ll learn

Understand the foundations of the NIST Cybersecurity Framework
Be able to use the Framework Core
Be able to use the Framework Tiers
Be able to use the Framework Implementation Profile

Implementing the NIST Cybersecurity Framework CSF

Requirements

No special tools are required, just a willingness to learn about using the NIST Cybersecurity Framework

Description

Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) to understand and actively manage their risk posture.You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:What are the components of the framework?Why is the framework is valuable?What type of organizations can use the framework?Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.What Other Students Are Saying About Our Other Courses:I took NIST CSF courses before, but this course gave me more details about what I needed to know about an implementation of NIST CSF. With this course, I could say that I am prepared to practice for the NIST CSF Lead Implementer practice test.  (Akoete Balikpo, 5 stars)Upon completion of this course, you will earn 4 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.

Overview

Section 1: Introduction to the NIST Cybersecurity Framework

Lecture 1 Welcome

Lecture 2 Download your free study guide

Lecture 3 Value Proposition

Lecture 4 Intended Audience

Lecture 5 Framework Components

Lecture 6 Five Functions

Lecture 7 Controls and Outcomes

Section 2: Using the NIST Cybersecurity Framework

Lecture 8 Using the Core

Lecture 9 Using the Implementation Profile

Lecture 10 Using the Tiers

Lecture 11 Using Components

Lecture 12 Finding the Controls

Section 3: Real World Case Studies

Lecture 13 Real World Case Studies

Lecture 14 Intel (Microchip Manufacturing)

Lecture 15 Cimpress (Promotional Products)

Lecture 16 DOE (Energy Industry)

Lecture 17 Western Australia (Local Government)

Lecture 18 Saudi Aramco (Oil Industry)

Lecture 19 University of Kansas Medical Center

Section 4: Implementing Phase One of the CR-MAP

Lecture 20 Phase One

Lecture 21 Widen Your Scope

Lecture 22 Get Buy-In

Lecture 23 Select Interviewees

Lecture 24 Generate Questionnaire

Lecture 25 Choose Target Scores

Lecture 26 Conduct Interviews

Lecture 27 Compile and Average Scores

Lecture 28 Identify Top 5 Cyber Risks

Section 5: Implementing Phase Two of the CR-MAP

Lecture 29 Phase Two

Lecture 30 Close Your Gaps

Lecture 31 Total Cost of Ownership

Lecture 32 Business Value Analysis

Lecture 33 Dashboard and Roadmap

Lecture 34 Internal Marketing

Lecture 35 External Marketing

Section 6: Implementing Phase Three of the CR-MAP

Lecture 36 Phase Three

Lecture 37 Monthly Check-ins

Lecture 38 Quarterly Reviews

Lecture 39 Annual Cybersecurity Summit

Section 7: Conclusion

Lecture 40 BONUS – Conclusion

Cybersecurity Professionals,Information Technology Practitioners,Risk Management Practitioners,Business Leaders and Executives

Course Information:

Udemy | English | 3h 18m | 2.55 GB
Created by: Jason Dion • 1 Million+ Enrollments Worldwide

You Can See More Courses in the IT & Software >> Greetings from CourseDown.com

New Courses

Scroll to Top