NIST Cybersecurity Framework (NCSF) Foundation Training in Euless
Enroll in or hire us to teach our NIST Cybersecurity Framework (NCSF) Foundation class in Euless, Texas by calling us @303.377.6176. Like all HSG
classes, NIST Cybersecurity Framework (NCSF) Foundation may be offered either onsite or via instructor led virtual training. Consider looking at our public training schedule to see if it
is scheduled: Public Training Classes
Provided there are enough attendees, NIST Cybersecurity Framework (NCSF) Foundation may be taught at one of our local training facilities.
We offer private customized training for groups of 3 or more attendees.
|
||
Course Description |
||
The one-day LRS NIST Cybersecurity Foundation course is designed for anyone in an organization who needs to understand the basics of cybersecurity, the components of the NIST CSF, and how the NIST CSF aligns to risk management. Security, IT, risk management, policy makers, and other business professionals who have responsibility for aspects of business or technical security can benefit from this course.
Course Length: 1 Days
Course Tuition: $290 (US) |
Prerequisites |
|
Basic computing skills and security knowledge will be helpful. |
Course Outline |
MODULE 1: COURSE INTRODUCTION
Provides the student with information relative to the course, conduct of the course in the virtual classroom, and course materials.
MODULE 2: THE BASICS OF CYBERSECURITY
What is cybersecurity?
Types of attackers
Vulnerabilities
Exploits
Threats
Controls
Frameworks
Risk-Based Cybersecurity
MODULE 3: A HOLISTIC STUDY OF THE NIST CYBERSECURITY FRAMEWORK
History
EO 13636
Cybersecurity Enhancement Act of 2014
EO 13800
Uses and Benefits of the Framework
Attributes of the Framework
Framework Component Introduction
Framework Core
Framework Profiles
Framework Implementation Tiers
MODULE 4: CYBERSECURITY ACTIVITIES: THE FRAMEWORK CORE
Purpose of the Core
Core Functions, Categories, and Subcategories
Informative References
MODULE 5: RISK MANAGEMENT CONSIDERATIONS: FRAMEWORK IMPLEMENTATION TIERS
Purpose of the Tiers
The Four Tiers
Components of the Tiers
Compare and contrast the NIST Cybersecurity Framework with the NIST Risk Management Framework
MODULE 6: CURRENT AND DESIRED OUTCOMES: FRAMEWORK PROFILES
Purpose of the Profiles
The Two Profiles
Interrelationships between the Framework Components
MODULE 7: A PRIMER ON THE SEVEN STEP FRAMEWORK IMPLEMENTATION PROCESS
Prioritize and Scope
Orient
Create a Current Profile
Conduct a Risk Assessment
Create a Target Profile
Determine, Analyze, and Prioritize Gaps
Implement Action Plan
|
Course Directory [training on all levels]
Technical Training Courses
Software engineer/architect, System Admin ... Welcome!
- .NET Classes
- Agile/Scrum Classes
- Ajax Classes
- Android and iPhone Programming Classes
- Blaze Advisor Classes
- C Programming Classes
- C# Programming Classes
- C++ Programming Classes
- Cisco Classes
- Cloud Classes
- CompTIA Classes
- Crystal Reports Classes
- Design Patterns Classes
- DevOps Classes
- Foundations of Web Design & Web Authoring Classes
- Git, Jira, Wicket, Gradle, Tableau Classes
- IBM Classes
- Java Programming Classes
- JBoss Administration Classes
- JUnit, TDD, CPTC, Web Penetration Classes
- Linux Unix Classes
- Machine Learning Classes
- Microsoft Classes
- Microsoft Development Classes
- Microsoft SQL Server Classes
- Microsoft Team Foundation Server Classes
- Microsoft Windows Server Classes
- Oracle, MySQL, Cassandra, Hadoop Database Classes
- Perl Programming Classes
- Python Programming Classes
- Ruby Programming Classes
- Security Classes
- SharePoint Classes
- SOA Classes
- Tcl, Awk, Bash, Shell Classes
- UML Classes
- VMWare Classes
- Web Development Classes
- Web Services Classes
- Weblogic Administration Classes
- XML Classes
Business Training Courses
Project Managers, Business Analysts, Paralegals ... Welcome!
Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.