Companies Home Search Profile

Master the NIST Cybersecurity Framework: An In-Depth Guide

Focused View

Alexander Oni

2:31:45

35 View
  • 001 Welcome to the Course.mp4
    03:19
  • 002 Download the Slides and Resource Handbook.html
  • 002 NIST-FRAMEWORK-SLIDES.zip
  • 002 NIST-Framework-Summary-Book.pdf
  • 003 Introduction to the NIST Framework.mp4
    07:17
  • 004 History of the NIST Framework.mp4
    03:35
  • 005 Implementation Tiers.mp4
    04:49
  • 006 Framework Profile.mp4
    01:29
  • 001 Introduction.mp4
    00:59
  • 002 Identify (ID).mp4
    07:14
  • 003 Protect (PR).mp4
    04:18
  • 004 Detect (DE).mp4
    02:27
  • 005 Respond (RE).mp4
    03:08
  • 006 Recover (RC).mp4
    03:43
  • 001 Introduction to Activities & Tasks.mp4
    01:29
  • 002 Asset Management Tasks.mp4
    03:26
  • 003 Business Environment Tasks.mp4
    03:09
  • 004 Governance Tasks.mp4
    02:09
  • 005 Risk Assessment Tasks.mp4
    04:38
  • 006 Risk Management Tasks.mp4
    04:04
  • 007 Supply Chain Tasks.mp4
    03:32
  • 001 Access Control.mp4
    05:56
  • 002 Awareness Training.mp4
    01:21
  • 003 Data Security.mp4
    02:57
  • 004 Information Protection (IP) Processes and Procedures.mp4
    05:24
  • 005 Maintenance.mp4
    01:30
  • 006 Protective Technology.mp4
    03:43
  • 001 Anomalies & Events.mp4
    03:47
  • 002 Continuous Monitoring.mp4
    03:53
  • 003 Detection Processes.mp4
    02:10
  • 001 Response Planning.mp4
    01:21
  • 002 Communications.mp4
    04:20
  • 003 Analysis.mp4
    04:16
  • 004 Mitigation.mp4
    02:01
  • 005 Improvements.mp4
    00:54
  • 001 Recovery Planning & Improvements.mp4
    01:33
  • 002 Communications.mp4
    02:39
  • 001 Implementing the Framework.mp4
    07:21
  • 002 7 Step Practical Approach.mp4
    03:18
  • 003 Case Study - Tax Legal Firm.mp4
    08:03
  • 004 Success Story - University of Chicago.mp4
    10:19
  • 001 The NIST 800-37.mp4
    01:20
  • 002 The NIST SP 800-53.mp4
    04:39
  • 003 Getting your Certificate.mp4
    03:00
  • 004 Thank You.mp4
    01:15
  • Description


    Learn how to apply and manage the NIST Cyber Security Framework (CSF) to any organization

    What You'll Learn?


    • Learn about the NIST Framework in complete details
    • Perform cyber risk analysis effectively
    • Identify and manage cyber risks
    • Be able to apply the NIST Framework both theoretically and practically

    Who is this for?


  • Cyber security Professionals who want to learn about Risk Management
  • Cyber Risk Analysts and Managers
  • What You Need to Know?


  • A background in cyber security is required
  • More details


    Description

    The NIST Cybersecurity Framework has emerged as a comprehensive guideline for organizations to enhance their cybersecurity posture, manage risks, and safeguard critical information systems. This course provides a thorough exploration of the NIST Cybersecurity Framework, offering a detailed understanding of its principles, components, and practical implementation strategies.

    Throughout the course, students will delve into the five core functions of the NIST Cybersecurity Framework: Identify, Protect, Detect, Respond, and Recover. Emphasizing a holistic and risk-based approach, participants will gain the knowledge and skills necessary to apply the framework within various organizational contexts.

    Key Course Topics:

    1. Introduction to the NIST Cybersecurity Framework

    • Overview of cybersecurity frameworks

    • Evolution and purpose of the NIST Cybersecurity Framework

    • Core components and structure of the framework

    1. Understanding the Core Functions

    • Identify: Asset management, risk assessment, and governance

    • Protect: Access controls, awareness training, and data security

    • Detect: Continuous monitoring and anomaly detection

    • Respond: Incident response planning and communication strategies

    • Recover: Recovery planning and improvement processes

    1. NIST Framework Implementation

    • Mapping organizational goals and objectives to the framework

    • Integrating the framework into existing cybersecurity programs

    • Establishing risk management processes

    • Developing policies, procedures, and guidelines aligned with the framework

    1. Framework Assessment and Measurement

    • Evaluating the effectiveness of framework implementation

    • Measuring cybersecurity maturity

    • Conducting gap analysis and remediation strategies

    • Establishing performance metrics and continuous improvement practices

    1. Case Studies and Best Practices

    • Real-world examples of organizations implementing the NIST Cybersecurity Framework

    • Best practices for successful implementation and adoption

    • Lessons learned and practical insights from industry experts

    By the end of this course, participants will have a comprehensive understanding of the NIST Cybersecurity Framework and its application within diverse organizational settings. They will be equipped with the skills to assess, plan, and implement cybersecurity practices aligned with the framework's principles, helping organizations proactively manage cyber risks and protect critical assets in an increasingly interconnected world.

    Who this course is for:

    • Cyber security Professionals who want to learn about Risk Management
    • Cyber Risk Analysts and Managers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Alexander Oni
    Alexander Oni
    Instructor's Courses
    My passion is teaching people through online courses in a fun and entertaining manner.  I have been teaching online for about 5 years now and during this period, I have created over 25 different courses with more than 132,000 students registered worldwide.What would you like to learn? Would you like to learn how to build and manage your WordPress website?Would you like to learn advanced skills that will make you a true WordPress developer?Would you like to learn how you can establish a successful career as a web developer?Would you like to learn the basics of information and cyber security? If you want to do any of these things, just enroll in the  course and  I'm always improving my courses so that they stay up to date and the  best that they can be. Check them out, and enroll today!MORE ABOUT ALEX:We all have one shot at life and as such, I believe in living life to the fullest. This means constantly stepping out of my comfort zone by visiting new places and trying out new things. My relative success on Udemy has given me both financial freedom and the ability to be location independent. I am currently travelling around the world spending about a month in one city (current location is Chiang Mai, Thailand) before moving on to the next. My hobbies include watching movies, sports and playing chess. I am also a huge Dead by Daylight gamer.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 42
    • duration 2:31:45
    • English subtitles has
    • Release Date 2023/11/20