HPE_H0DV7S NCSP Foundation Training
Digital Transformation • Explain what it means to “become digital”• Discuss the difference between industrial and digital era enterprises• Explain how cybersecurity supports an organization'sdigital Transformation Understanding Cyber Risks • Explain the cyber risk equation• Identify and explain each component of the cyber risk equation• Describe the basics of a risk assessmentNIST Cybersecurity Framework Fundamentals • Explain thegenesis of the NIST-CSF• List and describe the components of the NIST-CSF• Describe each of the NIST-CSF's objectives Core Functions, Categories and Subcategories• Understand and explain– Core functions– Framework categories– Informative references Implementation Tiers and Profiles • Understand and explain Implementation Tier terms and their use• Understand and explain each Implementation Tier• Understand and describe the three risk categories• Understand and explain Profiles and their use• Understand and describe the use of Profiles when– Determining gaps– Identifying and prioritizing focus areas Cybersecurity Improvement • Understand and explain how an organization canapproach the adoption and adaptation of the NIST-CSF• Understand and describe how to implement cybersecurity controls using an incremental improvement approach• Understand and describe CIIS as a practice within an organization
COURSE OBJECTIVE:
At the conclusion of this course, the student will be ableto:• Use the Framework as a key part of asystematic process for identifying, assessing,and managing cybersecurity risk• Overlay the Framework onto currentprocesses to determine gaps in currentcybersecurity risk approach and develop aroadmap• Use the Framework as a cybersecurity riskmanagement tool• Determine activities that are most importantto critical service delivery and prioritizeexpenditures to maximize the impact of theinvestment.
TARGET AUDIENCE:
• Candidates looking to pursue a career incybersecurity• IT, cybersecurity and digital transformationdesign and implementation engineers• IT, cybersecurity and digital transformationtechnical operations and business analysts• IT, cybersecurity and digital transformation specialistsincluding pen testers, ethicalhackers, software and application developers,auditors, and investigators
COURSE PREREQUISITES:
Working knowledge of IT
COURSE CONTENT:
H0DV7S (hpe.com)
FOLLOW ON COURSES:
Not available. Please contact.
Tilleggsinformasjon
Relaterte produkter
- HPE_H0LN3S HPE Synergy AdministrationBestill
This course provides instruction on HPE Synergy configuration, administration, management, troubleshooting and maintenance. This hands-on course covers day-to-day administration skills on HPE Synergy Composer, storage module, compute modules, frame…
- HPE_H8PE4S HPE Superdome Flex Server AdministrationBestill
The HPE Superdome Flex Server is the mission critical, in memory computing solution that delivers an unprecedented combination of scale, modularity, flexibility, and reliability. This course provides an overview…
- HPE_H6LQ8S Service Integration and Management (SIAM®) FoundationBestill
The SIAM Foundation course improves a candidate's knowledge and understanding of the terminology and the core principles of the SIAM framework. This course covers a variety of subjects including…