Companies Home Search Profile

AKYLADE Certified Cyber Resilience Fundamentals (A/CCRF)

Focused View

Jason Dion • 1 Million+ Enrollments Worldwide,Dion Training Solutions • ATO for ITIL & PRINCE2,Dion Training Solutions • ATO for ITIL & PRINCE2,Reed Bidgood

7:21:02

17 View
  • 1. Introduction.mp4
    13:42
  • 2.1 AKYLADE Certified Cyber Resilience Fundamentals (CRF-002) Exam Objectives.pdf
  • 2.2 AKYLADE Certified Cyber Resilience Fundamentals (CRF-002) Study Guide.pdf
  • 2.3 AKYLADE Certified Cyber Resilience Fundamentals (CRF-002) Study Plan.pdf
  • 2. Download your free study guide.html
  • 3. Exam Tips.mp4
    05:15
  • 4. ACCRF and ACCRP.mp4
    06:28
  • 5. Checkpoint Introduction.html
  • 1. Cybersecurity Fundamentals (OBJ 1.1).mp4
    02:40
  • 2. Key Terms in Cybersecurity (OBJ 1.1).mp4
    08:42
  • 3. The CIANA Pentagon (OBJ 1.1).mp4
    08:45
  • 4. Threats and Vulnerabilities (OBJ 1.1).mp4
    05:17
  • 5. Determining Risk (OBJ 1.1).mp4
    05:58
  • 6. Checkpoint Cybersecurity Fundamentals.html
  • 1. Risk Management Fundamentals (OBJ 1.1, 5.1, 5.2, & 5.3).mp4
    05:47
  • 2. Phase 1 - Risk Identification (OBJ 1.1, 5.1, 5.2).mp4
    05:53
  • 3. Phase 2 - Risk Assessment (OBJ 5.1).mp4
    09:29
  • 4. Phase 3 - Risk Planning (OBJ 5.2).mp4
    07:03
  • 5. Phase 4 - Risk Mitigation (OBJ 5.3).mp4
    04:17
  • 6. Phase 5 - Risk Monitoring and Review (OBJ 5.3).mp4
    02:03
  • 7. Inherent and Residual Risk (OBJ 5.2).mp4
    04:44
  • 8. Business Impact Analysis (OBJ 5.1).mp4
    10:29
  • 9. Financial Analysis (OBJ 5.1).mp4
    09:27
  • 10. Checkpoint Risk Management Fundamentals.html
  • 1. NIST Cybersecurity Framework (CSF) (OBJ 1.1, 1.2, 1.3, & 1.4).mp4
    04:11
  • 2. NIST CSF Development (OBJ 1.4).mp4
    08:25
  • 3. Executive Orders and Regulations (OBJ 1.4).mp4
    06:31
  • 4. Applicability of the NIST CSF (OBJ 1.3).mp4
    06:08
  • 5. Characteristics of the Framework (OBJ 1.3).mp4
    04:57
  • 6. Cyber Resilience (OBJ 1.1).mp4
    03:57
  • 7. Critical Infrastructure (OBJ 1.3).mp4
    09:30
  • 8. Audience for the NIST CSF (OBJ 1.3).mp4
    03:16
  • 9. Purpose of the NIST CSF (OBJ 1.2).mp4
    04:40
  • 10. Checkpoint NIST Cybersecurity Framework.html
  • 1. Framework Components (OBJ 1.2).mp4
    02:08
  • 2. Overview of the Framework Core (OBJ 1.2).mp4
    05:07
  • 3. Overview of the Implementation Tiers (OBJ 1.2).mp4
    06:20
  • 4. Overview of Framework Profiles (OBJ 1.2).mp4
    05:24
  • 5. Checkpoint Framework Components.html
  • 1. The Six Functions (OBJ 2.2, 2.3).mp4
    04:54
  • 2. Govern (GV) (OBJ 2.2, 2.3).mp4
    11:46
  • 3. Identify (ID) (OBJ 2.2, 2.3).mp4
    07:16
  • 4. Protect (PR) (OBJ 2.2, 2.3).mp4
    08:06
  • 5. Detect (DE) (OBJ 2.2, 2.3).mp4
    04:17
  • 6. Respond (RS) (OBJ 2.2, 2.3).mp4
    05:13
  • 7. Recover (RC) (OBJ 2.2, 2.3).mp4
    04:17
  • 8. Checkpoint The Six Functions.html
  • 1. Controls and Outcomes (OBJ 1.3, 2.2, & 2.4).mp4
    05:30
  • 2. Controls (OBJ 1.3, 2.2, & 2.4).mp4
    03:16
  • 3. Voluntary Nature of the NIST CSF (OBJ 1.3, 2.2, & 2.4).mp4
    06:12
  • 4. Outcomes (OBJ 1.3, 2.2, & 2.4).mp4
    08:21
  • 5. Informative References (OBJ 1.3, 2.2, & 2.4).mp4
    03:59
  • 6. ISOIEC 27001 and 27002 (OBJ 1.3, 2.2, & 2.4).mp4
    04:36
  • 7. NIST Special Publications (OBJ 1.3, 2.2, & 2.4).mp4
    05:30
  • 8. CIS CSC (OBJ 1.3, 2.2, & 2.4).mp4
    01:57
  • 9. COBIT 5 (OBJ 1.3, 2.2, & 2.4).mp4
    01:56
  • 10. ITIL (OBJ 1.3, 2.2, & 2.4).mp4
    02:37
  • 11. PCI DSS (OBJ 1.3, 2.2, & 2.4).mp4
    02:35
  • 12. HIPAA (OBJ 1.3, 2.2, & 2.4).mp4
    02:30
  • 13. NERC CIP (OBJ 1.3, 2.2, & 2.4).mp4
    02:24
  • 14. FEDRAMP (OBJ 1.3, 2.2, & 2.4).mp4
    02:39
  • 15. STAR (OBJ 1.3, 2.2, & 2.4).mp4
    03:31
  • 16. OWASP (OBJ 1.3, 2.2, & 2.4).mp4
    02:54
  • 17. Checkpoint Controls and Outcomes.html
  • 1. Implementation Tiers (OBJ 3.1, 3.2, & 3.3).mp4
    03:24
  • 2. Choosing an Implementation Tier (OBJ 3.1, 3.2, & 3.3).mp4
    05:17
  • 3. Implementation Tier Progression (OBJ 3.1, 3.2, & 3.3).mp4
    05:56
  • 4. Maturity Models (OBJ 3.1, 3.2, & 3.3).mp4
    07:45
  • 5. Moving Between Implementation Tiers (OBJ 3.1, 3.2, & 3.3).mp4
    06:49
  • 6. Checkpoint Implementation Tiers.html
  • 1. Using the Profiles (OBJ 4.1, 4.2, 4.3).mp4
    04:26
  • 2. Key Components (OBJ 4.1).mp4
    04:22
  • 3. Creating a Profile (OBJ 4.1).mp4
    06:25
  • 4. Profile Tailoring (OBJ 4.2).mp4
    07:24
  • 5. Profile Templates (OBJ 4.3).mp4
    04:34
  • 6. Current and Target Profiles (OBJ 4.1).mp4
    02:44
  • 7. Profiles for Regulatory Compliance (OBJ 4.2).mp4
    03:16
  • 8. Secure One and Comply Many (OBJ 4.2).mp4
    09:20
  • 9. Checkpoint Using the Profiles.html
  • 1. Sector-specific Profiles (OBJ 4.3).mp4
    03:37
  • 2. CRI Profile (OBJ 4.4).mp4
    04:34
  • 3. Manufacturing Profile (OBJ 4.3).mp4
    08:15
  • 4. Election Infrastructure Profile (OBJ 4.3).mp4
    02:19
  • 5. Satellite Networks Profile (OBJ 4.3).mp4
    02:13
  • 6. Smart Grid Profile (OBJ 4.3).mp4
    01:58
  • 7. Connected Vehicle Profile (OBJ 4.3).mp4
    02:38
  • 8. Payroll Profile (OBJ 4.3).mp4
    02:19
  • 9. Maritime Profile (OBJ 4.3).mp4
    02:19
  • 10. Communications Profile (OBJ 4.3).mp4
    02:13
  • 11. Checkpoint Sector-specific Profiles.html
  • 1. Assessing Cybersecurity Risk (OBJ 5.3).mp4
    03:39
  • 2. Case Study Overview (OBJ 5.3).mp4
    02:41
  • 3. Identifying Threats (OBJ 5.3).mp4
    02:08
  • 4. Identifying Vulnerabilities (OBJ 5.3).mp4
    02:38
  • 5. Identifying Risks (OBJ 5.3).mp4
    03:03
  • 6. Risk Mitigation Recommendations (OBJ 5.3).mp4
    02:13
  • 7. Benefits and Trade-offs (OBJ 5.3).mp4
    03:45
  • 8. Evaluating Effectiveness (OBJ 5.3).mp4
    02:40
  • 9. Risk Management Plan (OBJ 5.3).mp4
    02:24
  • 10. Cybersecurity Strategy (OBJ 5.3).mp4
    02:33
  • 11. Checkpoint Assessing Cybersecurity Risk.html
  • 1. Conclusion.mp4
    12:18
  • 2. AKYLADE Certified Cyber Resilience Fundamentals (ACCRF) (CRF-002) Practice Exam.html
  • 3. BONUS What comes next.mp4
    04:04
  • 4. test.html
  • Description


    Pass the AKYLADE Certified Cyber Resilience Fundamentals (CRF-002) exam on your 1st attempt, includes a practice exam!

    What You'll Learn?


    • Apply the CSF effectively within their own organizations
    • Enhance cyber resilience by managing and mitigating cyber risks
    • Communicate the benefits and applications of cyber resilience strategies to stakeholders
    • Prepare for and respond to cybersecurity incidents effectively

    Who is this for?


  • Professionals involved in cybersecurity and risk management
  • IT managers
  • Security analysts
  • Compliance officers
  • Anyone looking to expand their knowledge on implementing and managing the NIST CSF
  • What You Need to Know?


  • Basic understanding of cybersecurity principles is recommended
  • Experience in IT or cybersecurity roles is beneficial for contextual application
  • More details


    Description

    AKYLADE Certified Cyber Resilience Fundamentals (A/CCRF) (CRF-002) Certification Course

    Course Overview
    Welcome to the AKYLADE Certified Cyber Resilience Fundamentals (A/CCRF) (CRF-002) course, where you'll master the NIST Cybersecurity Framework (CSF) version 2.0. This course is designed to enhance your understanding and application of the framework within various organizational contexts, focusing on cyber resilience and strategic risk management across multiple sectors.


    Domains
    The course content is categorized into five distinct domains, emphasizing a structured approach to cyber resilience:

    • Framework Concepts (25%): Explore the origins, structure, and applicability of the CSF, including its components and key cybersecurity terms.

    • Framework Core (30%): Delve into the core functions such as Identify, Protect, Detect, Respond, and Recover, integrating 22 categories and 106 subcategories to manage cyber risks.

    • Implementation Tiers (10%): Understand different maturity levels within an organization’s cybersecurity practices and how to enhance them.

    • Framework Profiles (15%): Learn to tailor the CSF to specific organizational needs through profiles that adapt to varying risk management strategies.

    • Risk Management (20%): Gain insights into analyzing and managing cyber risks with practical tools and techniques that support decision-making.


    Course Features

    Structured Study Guide: Navigate through the CSF with our detailed guide.
    Interactive Assessments: Test your knowledge through quizzes and multiple practice exams to reinforce learning.


    Learning Outcomes
    Participants will finish the course with the ability to apply the CSF effectively within their own organizations, enhance cyber resilience by managing and mitigating cyber risks, communicate the benefits and applications of cyber resilience strategies to stakeholders, and prepare for and respond to cybersecurity incidents effectively.


    Intended Learners
    This course is targeted at professionals involved in cybersecurity and risk management, including IT managers, security analysts, and compliance officers. It's also ideal for anyone looking to expand their knowledge on implementing and managing the NIST CSF in various sectors such as healthcare, finance, and government.


    Requirements
    Basic understanding of cybersecurity principles is recommended. Experience in IT or cybersecurity roles is beneficial for contextual application.


    Take the Next Step in Cybersecurity Excellence
    Enhance your strategic approach to cybersecurity with AKYLADE Certified Cyber Resilience Fundamentals (A/CCRF) (CRF-002). Equip yourself with the skills to advance in the field of cyber resilience.

    Enroll Now and Secure Your Future!


    What Other Students Are Saying About Our Courses:

    • This course has really helped me understand how the NIST CSF maps out to the NIST SP 800-53 Rev.5 controls. Very important course to take for those in cyber and information security. (William D., 5 stars)

    • This course not only explain the NIST CSF, but also gave me many hints on how to implement it in real business situations. (Kenshi K., 5 stars)

    • Excellent course that helped me gain a better understanding of translating the list of NIST 800 implementations into a practical application I can use for my company and all others we advise on. Thank you! (David S., 5 stars)


    Upon completion of this course, you will earn 8 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.

    Who this course is for:

    • Professionals involved in cybersecurity and risk management
    • IT managers
    • Security analysts
    • Compliance officers
    • Anyone looking to expand their knowledge on implementing and managing the NIST CSF

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Jason Dion • 1 Million+ Enrollments Worldwide
    Jason Dion • 1 Million+ Enrollments Worldwide
    Instructor's Courses
    Jason Dion, CISSP No. 349867, is a former college professor and the lead instructor at Dion Training Solutions. He has multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), CySA+, Security+, Network+, A+, PRINCE2 Practitioner, and ITIL. With networking experience dating back to 1992, Jason has been a network engineer, Director of a Network Operations and Security Center, and an Information Systems Officer for large organizations around the globe. He holds a Master’s of Science degree in Information Technology with a specialization in Information Assurance. He lives in Puerto Rico with his wife and two children.
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Instructor's Courses
    Learn Faster and Get CertifiedDue to the design of our materials, you will learn faster and focus your studies on passing your certifications. With our tools and techniques, you will be ready to take and pass your certification exam on your first attempt!Training the Cybersecurity WorkforceWe strive to train the cybersecurity workforce of today and tomorrow. Whether you need to earn your next certification to be competitive for that position, or you just need to do your continuing education to maintain your current certifications, Dion Training is here to support you.
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Instructor's Courses
    Learn Faster and Get CertifiedDue to the design of our materials, you will learn faster and focus your studies on passing your certifications. With our tools and techniques, you will be ready to take and pass your certification exam on your first attempt!Training the Cybersecurity WorkforceWe strive to train the cybersecurity workforce of today and tomorrow. Whether you need to earn your next certification to be competitive for that position, or you just need to do your continuing education to maintain your current certifications, Dion Training is here to support you.
    Reed Bidgood
    Reed Bidgood
    Instructor's Courses
    Reed is the lead Project Management and Data Analysis Instructor for Dion Training Solutions. He is a former Air Force Officer with experience leading large teams of personnel and projects for the Department of Defense and holds multiple information technology and project management certifications including CompTIA's Project+, Data+ and Network+ certifications and PRINCE2’s Foundation and Practitioner certifications.Reed is a graduate of the University of Delaware where he majored in Mandarin Chinese and Political Science. When he’s not breaking his Linux laptop, he’s outside backpacking in bear country or competing in Brazilian Jiu Jitsu.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 88
    • duration 7:21:02
    • Release Date 2024/08/11