Kurskode: HPE_H0DV7S

varighet: 1 Dag(er)

Sted:Instructor Led Training
Katergori: Hewlett Packard Enterprise (HPE)

Course Overview

Digital Transformation

• Explain what it means to “become digital”

• Discuss the difference between industrial and digital era

enterprises

• Explain how cybersecurity supports an organization’sdigital

Transformation

 

Understanding Cyber Risks

• Explain the cyber risk equation

• Identify and explain each component of the cyber risk

equation

• Describe the basics of a risk assessment

NIST Cybersecurity Framework Fundamentals • Explain thegenesis of the NIST-CSF

• List and describe the components of the NIST-CSF

• Describe each of the NIST-CSF’s objectives

 

Core Functions, Categories and Subcategories

• Understand and explain

– Core functions

– Framework categories

– Informative references

 

Implementation Tiers and Profiles

• Understand and explain Implementation Tier terms and

their use

• Understand and explain each Implementation Tier

• Understand and describe the three risk categories

• Understand and explain Profiles and their use

• Understand and describe the use of Profiles when

– Determining gaps

– Identifying and prioritizing focus areas

 

Cybersecurity Improvement

• Understand and explain how an organization can

approach the adoption and adaptation of the NIST-CSF

• Understand and describe how to implement cybersecurity

controls using an incremental improvement approach

• Understand and describe CIIS as a practice within an

organization

At the conclusion of this course, the student will be ableto:

• Use the Framework as a key part of a

systematic process for identifying, assessing,

and managing cybersecurity risk

• Overlay the Framework onto current

processes to determine gaps in current

cybersecurity risk approach and develop a

roadmap

• Use the Framework as a cybersecurity risk

management tool

• Determine activities that are most important

to critical service delivery and prioritize

expenditures to maximize the impact of the

investment.

Working knowledge of IT

• Candidates looking to pursue a career in

cybersecurity

• IT, cybersecurity and digital transformation

design and implementation engineers

• IT, cybersecurity and digital transformation

technical operations and business analysts

• IT, cybersecurity and digital transformation specialistsincluding pen testers, ethical

hackers, software and application developers,

auditors, and investigators

Relaterte kurs