Digital Transformation
• Explain what it means to “become digital”
• Discuss the difference between industrial and digital era
enterprises
• Explain how cybersecurity supports an organization’sdigital
Transformation
Understanding Cyber Risks
• Explain the cyber risk equation
• Identify and explain each component of the cyber risk
equation
• Describe the basics of a risk assessment
NIST Cybersecurity Framework Fundamentals • Explain thegenesis of the NIST-CSF
• List and describe the components of the NIST-CSF
• Describe each of the NIST-CSF’s objectives
Core Functions, Categories and Subcategories
• Understand and explain
– Core functions
– Framework categories
– Informative references
Implementation Tiers and Profiles
• Understand and explain Implementation Tier terms and
their use
• Understand and explain each Implementation Tier
• Understand and describe the three risk categories
• Understand and explain Profiles and their use
• Understand and describe the use of Profiles when
– Determining gaps
– Identifying and prioritizing focus areas
Cybersecurity Improvement
• Understand and explain how an organization can
approach the adoption and adaptation of the NIST-CSF
• Understand and describe how to implement cybersecurity
controls using an incremental improvement approach
• Understand and describe CIIS as a practice within an
organization
At the conclusion of this course, the student will be ableto:
• Use the Framework as a key part of a
systematic process for identifying, assessing,
and managing cybersecurity risk
• Overlay the Framework onto current
processes to determine gaps in current
cybersecurity risk approach and develop a
roadmap
• Use the Framework as a cybersecurity risk
management tool
• Determine activities that are most important
to critical service delivery and prioritize
expenditures to maximize the impact of the
investment.
Working knowledge of IT
• Candidates looking to pursue a career in
cybersecurity
• IT, cybersecurity and digital transformation
design and implementation engineers
• IT, cybersecurity and digital transformation
technical operations and business analysts
• IT, cybersecurity and digital transformation specialistsincluding pen testers, ethical
hackers, software and application developers,
auditors, and investigators
COURSE CONTENT: Module 1: Product Overview • List HPE Superdome Flex serverconfigurations and architecture • Describe use case and applications • Identify HPE Superdome Flex server main components •…
COURSE CONTENT: HK904S TARGET AUDIENCE: A storage administrator who has been managing HPE 3PAR StoreServ arrays on a dailybasis for at least a year. This training is…