Chapter 1: Course Introduction
• Course organization
• Setting the stage
Chapter 2: Digital Transformation
• DX as a practitioner
• DX in the context of cybersecurity
• Cybersecurity as a DX catalyst
Chapter 3: Threat Landscape
• Threat actors: Agile and Creative
• Attacks
• Challenges
• Organizational response to threat landscape
• Absolute prevention not possible
Chapter 4: The Controls
• Initiation and basic
• Foundation
• Organizational and recovery
Chapter 5: Adopt and Adapt
• The context of adopt and adapt
• Cybersecurity and culture
• Where we are
Chapter 6: Adaptive Way of Working
• Introduction to adaptive way to work
• How to get started
Chapter 7: Rapid Adoption and Rapid Adaptation FastTrack™
• Rapid adoption
• Rapid adaptation
Chapter 8: CIIS as a Practice
• Ongoing practice of cybersecurity
• NIST 7-step improvement
• Cybersecurity Maturity Model Certification (CMMC)
• Integrate cybersecurity
At the conclusion of this class, students will know a practical approach to build and maintain a comprehensive cybersecurity and cyber-risk management program.
Candidates must complete the NCSP Foundation class (H0DV7S) and pass the NCSP Foundation exam.
• Candidates looking to pursue a career in cybersecurity
• IT, cybersecurity and digital transformation design andimplementation engineers
• IT, cybersecurity and digital transformation technicaloperations and business analysts
• IT, cybersecurity and digital transformation specialistsincluding pen testers, ethical hackers, software and application developers,auditors, and investigators
COURSE CONTENT: DAY 1 Course Introduction Introducing Junos OS and the Hardware It Powers • Test your knowledge of some networking fundamentals • Explain the advantages of Junos OS…
This core course covers the fundamentals needed to deploy, configure, and manage daily operations of Check Point Security Gateways and Management Software Blades that run on the Gaia operating…