Companies Home Search Profile

NIST Cyber Security Framework

Focused View

Michael Goedeker

2:58:29

225 View
  • 1. Sneak Peak into the NIST Cybersecurity Framework.mp4
    04:25
  • 2.1 NIST.CSWP.04162018.pdf
  • 2. Introduction to NIST Cyber Security Framework.mp4
    18:12
  • 3. Quiz Intro to CSF.html
  • 4. Normative References, Standards & Guidelines.mp4
    19:42
  • 5. Normative References for CSF.html
  • 6. Module Identify (ID).mp4
    19:51
  • 7. Quiz Module ID.html
  • 8. Module Protect (PR).mp4
    30:31
  • 9. PR-Protect Module Quiz.html
  • 10. Module Detect (DE).mp4
    13:22
  • 11. DE Detection Module Quiz.html
  • 12. Module Respond (RS).mp4
    22:40
  • 13. RS Respond Module Quiz.html
  • 14. Module Recover (RC).mp4
    10:47
  • 15. RC Recovery Module Quiz.html
  • 16. Implementing NIST CSF.mp4
    26:09
  • 1.1 2018-04-16_framework_v1.1_core1.xlsx
  • 1.2 2022-09-13_NIST_CSF_Sheet.xlsx
  • 1.3 NIST.CSWP.04162018.pdf
  • 1.4 SS IEC 62443-3-3-2018 Preview.pdf
  • 1.5 whfs_profile_20220424.xlsx
  • 1. NIST CSF Document.mp4
    12:50
  • Description


    An introduction and look at the Cyber Security Framework and its Controls.

    What You'll Learn?


    • Understand what NIST Cyber Security Framework (CSF)is and how it was created
    • Understand the components of NIST CSF
    • Understand the NIST CSF Areas
    • Look at the individual NIST CSF Categories and Sub-Categories
    • Understand how to implement NIST CSF and do a Self-Assessment
    • Learn about the challenges and advantages of implementing NIST CSF

    Who is this for?


  • Anyone who wants to understand cybersecurity standards
  • Anyone who wants to understand what NIST CSF is
  • Implement CSF controls in an organization
  • Learn about the challenges and advantages of using the NIST CSF
  • What You Need to Know?


  • Understand what Cybersecurity is
  • Understand what a framework is
  • Read English
  • More details


    Description

    Understanding what the NIST Cybersecurity Framework is helps us to decide whether it’s the right framework for us. If we look at what NIST says the CSF is we read the following:

    Building from those standards, guidelines, and practices, the Framework provides a common taxonomy and mechanism for organizations to:

    1. Describe their current cybersecurity posture;

    2. Describe their target state for cybersecurity;

    3. Identify and prioritize opportunities for improvement within the context of a continuous and repeatable process;

    4. Assess progress toward the target state;

    5. Communicate among internal and external stakeholders about cybersecurity risk.

    The Framework is not a one-size-fits-all approach to managing cybersecurity risk for critical infrastructure. Organizations will continue to have unique risks – different threats, different vulnerabilities, different risk tolerances. They also will vary in how they customize practices described in the Framework. Organizations can determine activities that are important to critical service delivery and can prioritize investments to maximize the impact of each dollar spent. Ultimately, the Framework is aimed at reducing and better managing cybersecurity risks.

    This course will focus on the 5 Areas, Categories and Sub Categories of each area, we then work our way through the whole framework to then discuss the Pros and Cons of the CSF and how to implement it in a project at your company or for your company / team / department.

    Who this course is for:

    • Anyone who wants to understand cybersecurity standards
    • Anyone who wants to understand what NIST CSF is
    • Implement CSF controls in an organization
    • Learn about the challenges and advantages of using the NIST CSF

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Michael Goedeker
    Michael Goedeker
    Instructor's Courses
    Hi, my name is Mike and I have been working in the IT and Security space for more than 30 years. As a result of this long time in the security and technology industry I have amassed more than 15 separate certifications ranging from CISSP to more specific ones like SIEM Engineer. My academic life has seen multiple degrees and research as well from the apprenticeship all the way up to Doctoral Research for Heriot Watt University in Edinburgh and my Masters at Ulster University in Ireland. I am an author of 5 books in English and 3 in German as well as multiple articles, reports and papers on topics ranging from Cyberbullying in Social Networks up to and including Nation State Cyber Warfare and Espionage. Health-wise I have completed my Trainer Certification as well as Meditation, Fitness Instructor and also Tai-Chi Qi Gong training for relaxation, anti stress and other forms of holistic health practices. My specialities are Security, Cybersecurity, Cyber Risk, Intelligence, IT Technologies, Stress, Risk Management, Business Leadership, Business Management / Economics, Doctoral Research, and Holistic Health.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 10
    • duration 2:58:29
    • English subtitles has
    • Release Date 2022/11/20