Chapter 1: Course Introduction
โข Course organization
โข Setting the stage
Chapter 2: Digital Transformation
โข DX as a practitioner
โข DX in the context of cybersecurity
โข Cybersecurity as a DX catalyst
Chapter 3: Threat Landscape
โข Threat actors: Agile and Creative
โข Attacks
โข Challenges
โข Organizational response to threat landscape
โข Absolute prevention not possible
Chapter 4: The Controls
โข Initiation and basic
โข Foundation
โข Organizational and recovery
Chapter 5: Adopt and Adapt
โข The context of adopt and adapt
โข Cybersecurity and culture
โข Where we are
Chapter 6: Adaptive Way of Working
โข Introduction to adaptive way to work
โข How to get started
Chapter 7: Rapid Adoption and Rapid Adaptation FastTrackโข
โข Rapid adoption
โข Rapid adaptation
Chapter 8: CIIS as a Practice
โข Ongoing practice of cybersecurity
โข NIST 7-step improvement
โข Cybersecurity Maturity Model Certification (CMMC)
โข Integrate cybersecurity
At the conclusion of this class, students will know a practical approach to build and maintain a comprehensive cybersecurity and cyber-risk management program.
Candidates must complete the NCSP Foundation class (H0DV7S) and pass the NCSP Foundation exam.
โข Candidates looking to pursue a career in cybersecurity
โข IT, cybersecurity and digital transformation design andimplementation engineers
โข IT, cybersecurity and digital transformation technicaloperations and business analysts
โข IT, cybersecurity and digital transformation specialistsincluding pen testers, ethical hackers, software and application developers,auditors, and investigators
COURSE CONTENT: HK902S (hpe.com) ย TARGET AUDIENCE: ย This course is intended for StoreEasy customers, HPE Services field engineers, call center personnel, Presales and Channel Partners and other field…
COURSE CONTENT: Module 1 – Composable Infrastructure Introduction Module 2 – HPE Synergy Frame and Management Modules Overview Module 3 – HPE Synergy Gen10 Compute Modules Module 4 –…