Digital Transformation
โข Explain what it means to โbecome digitalโ
โข Discuss the difference between industrial and digital era
enterprises
โข Explain how cybersecurity supports an organizationโsdigital
Transformation
Understanding Cyber Risks
โข Explain the cyber risk equation
โข Identify and explain each component of the cyber risk
equation
โข Describe the basics of a risk assessment
NIST Cybersecurity Framework Fundamentals
โข Explain the genesis of the NIST-CSF
โข List and describe the components of the NIST-CSF
โข Describe each of the NIST-CSFโs objectives
Core Functions, Categories and Subcategories โข Understandand explain
โ Core functions
โ Framework categories
โ Informative references
Implementation Tiers and Profiles
โข Understand and explain Implementation Tier terms and
their use
โข Understand and explain each Implementation Tier
โข Understand and describe the three risk categories
โข Understand and explain Profiles and their use
โข Understand and describe the use of Profiles when
โ Determining gaps
โ Identifying and prioritizing focus areas
Cybersecurity Improvement
โข Understand and explain how an organization can
approach the adoption and adaptation of the NIST-CSF
โข Understand and describe how to implement cybersecurity
controls using an incremental improvement approach
โข Understand and describe CIIS as a practice within an
Organization
Chapter 1: Course Introduction
โข Course organization
โข Setting the stage
Chapter 2: Digital Transformation
โข DX as a practitioner
โข DX in the context of cybersecurity
โข Cybersecurity as a DX catalyst
Chapter 3: Threat Landscape
โข Threat actors: Agile and Creative
โข Attacks
โข Challenges
โข Organizational response to threat landscape
โข Absolute prevention not possible
Chapter 4: The Controls
โข Initiation and basic
โข Foundation
โข Organizational and recovery
Chapter 5: Adopt and Adapt
โข The context of adopt and adapt
โข Cybersecurity and culture
โข Where we are
Chapter 6: Adaptive Way of Working
โข Introduction to adaptive way to work
โข How to get started
Chapter 7: Rapid Adoption and Rapid Adaptation FastTrackโข
โข Rapid adoption
โข Rapid adaptation
Chapter 8: CIIS as a Practice
โข Ongoing practice of cybersecurity
โข NIST 7-step improvement
โข Cybersecurity Maturity Model Certification (CMMC)
โข Integrate cybersecurity
Upon completion of this course, studentswill have:
โข The skills and abilities to design, build, test, manage and improve a cybersecurity program based on the NCSF
โข The knowledge to prepare for theNSCP Boot Camp exam (Foundation +Practitioner)
Candidates must have a reasonable amount of cyber security awareness and/or experience.
โข Candidates looking to pursue a career incybersecurity
โข IT, cybersecurity and digital transformationdesign and implementation engineers
โข IT, cybersecurity and digital transformationtechnical operations and business analysts
โข IT, cybersecurity and digital transformationspecialists including pen testers, ethicalhackers, software and application developers,auditors, and investigators
COURSE CONTENT: H0LN3S ย TARGET AUDIENCE: ย โข System administrators, engineers andconsultants who install, manage, and monitorHPE Synergy systemsย โข New HPE Synergy customers or HPEBladeSystem c-Class customers interested…
COURSE CONTENT: H0LP9S ย TARGET AUDIENCE: ย This course is intended for infrastructureadministrators and system engineers whoneed to learn how to administer HPESimpliVity. ย COURSE OBJECTIVE: ย Upon completion…