Companies Home Search Profile

Security for the SMB: Implementing the NIST Cybersecurity Framework

Focused View

Ronald Woerner

1:23:20

80 View
  • 01 - Secure your infrastructure with NIST.mp4
    01:23
  • 01 - Understanding and managing your risks.mp4
    03:32
  • 02 - Cybersecurity threats and vulnerabilities.mp4
    03:58
  • 03 - Cybersecurity requirements.mp4
    02:36
  • 04 - NIST Cybersecurity Framework.mp4
    03:05
  • 05 - Cybersecurity five-step process overview.mp4
    02:54
  • 06 - Building a cybersecurity program.mp4
    03:21
  • 01 - Inventory of critical assets.mp4
    02:24
  • 02 - Business impact assessment.mp4
    01:48
  • 03 - Security policies and procedures.mp4
    03:33
  • 04 - I-AAA.mp4
    03:08
  • 01 - Overview of defending business assets.mp4
    00:50
  • 02 - Network defenses.mp4
    03:32
  • 03 - System security.mp4
    03:25
  • 04 - Encryption.mp4
    03:41
  • 05 - Personnel and physical security.mp4
    03:22
  • 01 - Detecting security issues overview.mp4
    02:24
  • 02 - System auditing and logging.mp4
    03:44
  • 03 - Monitoring and alerting.mp4
    03:06
  • 04 - Assessments and audits.mp4
    03:53
  • 01 - Establishing a response plan.mp4
    03:58
  • 02 - Incident response plan examples.mp4
    02:29
  • 03 - Digital forensics.mp4
    03:06
  • 04 - Response testing and training.mp4
    03:08
  • 01 - Your continuity of operations plan.mp4
    03:33
  • 02 - Backups, virtualization, and the cloud.mp4
    02:46
  • 01 - Best practices.mp4
    02:10
  • 02 - Resources.mp4
    02:31
  • Description


    Cybersecurity incidents impact organizations of all sizes, in all sectors. Small and medium businesses (SMBs) may not have the same infrastructure or resources for security, but face the same risks. In this course, Ron Woerner explains how to secure SMB assets, systems, and networks, leveraging the five functions of the National Institute of Standards and Technology (NIST) Cybersecurity Framework—identify, protect, detect, respond, and recover—as a scaffold for creating a robust cybersecurity program. Learn how to identify your assets and necessary levels of access, set up defenses such as firewalls and encryption, monitor your systems, create an effective incident response plan, and use backups and cloud services to ensure you can recover and resume operations as quickly as possible.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Ronald Woerner
    Ronald Woerner
    Instructor's Courses
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 28
    • duration 1:23:20
    • English subtitles has
    • Release Date 2024/07/27