Kurskode: HPE_H0DV9S

varighet: 5 Dag(er)

Sted: Virtual, Instructor Led Training
Katergori: Hewlett Packard Enterprise (HPE)

Course Overview

Digital Transformation

โ€ข Explain what it means to โ€œbecome digitalโ€

โ€ข Discuss the difference between industrial and digital era

enterprises

โ€ข Explain how cybersecurity supports an organizationโ€™sdigital

Transformation

 

Understanding Cyber Risks

โ€ข Explain the cyber risk equation

โ€ข Identify and explain each component of the cyber risk

equation

โ€ข Describe the basics of a risk assessment

 

NIST Cybersecurity Framework Fundamentals

โ€ข Explain the genesis of the NIST-CSF

โ€ข List and describe the components of the NIST-CSF

โ€ข Describe each of the NIST-CSFโ€™s objectives

Core Functions, Categories and Subcategories โ€ข Understandand explain

โ€“ Core functions

โ€“ Framework categories

โ€“ Informative references

 

Implementation Tiers and Profiles

โ€ข Understand and explain Implementation Tier terms and

their use

โ€ข Understand and explain each Implementation Tier

โ€ข Understand and describe the three risk categories

โ€ข Understand and explain Profiles and their use

โ€ข Understand and describe the use of Profiles when

โ€“ Determining gaps

โ€“ Identifying and prioritizing focus areas

Cybersecurity Improvement

 

โ€ข Understand and explain how an organization can

approach the adoption and adaptation of the NIST-CSF

โ€ข Understand and describe how to implement cybersecurity

controls using an incremental improvement approach

โ€ข Understand and describe CIIS as a practice within an

Organization

 

Chapter 1: Course Introduction

โ€ข Course organization

โ€ข Setting the stage

 

Chapter 2: Digital Transformation

โ€ข DX as a practitioner

โ€ข DX in the context of cybersecurity

โ€ข Cybersecurity as a DX catalyst

 

Chapter 3: Threat Landscape

โ€ข Threat actors: Agile and Creative

โ€ข Attacks

โ€ข Challenges

โ€ข Organizational response to threat landscape

โ€ข Absolute prevention not possible

 

Chapter 4: The Controls

โ€ข Initiation and basic

โ€ข Foundation

โ€ข Organizational and recovery

 

 

Chapter 5: Adopt and Adapt

โ€ข The context of adopt and adapt

โ€ข Cybersecurity and culture

โ€ข Where we are

 

Chapter 6: Adaptive Way of Working

โ€ข Introduction to adaptive way to work

โ€ข How to get started

 

Chapter 7: Rapid Adoption and Rapid Adaptation FastTrackโ„ข

โ€ข Rapid adoption

โ€ข Rapid adaptation

 

Chapter 8: CIIS as a Practice

โ€ข Ongoing practice of cybersecurity

โ€ข NIST 7-step improvement

โ€ข Cybersecurity Maturity Model Certification (CMMC)

โ€ข Integrate cybersecurity

Upon completion of this course, studentswill have:

โ€ข The skills and abilities to design, build, test, manage and improve a cybersecurity program based on the NCSF 

โ€ข The knowledge to prepare for theNSCP Boot Camp exam (Foundation +Practitioner)

Candidates must have a reasonable amount of cyber security awareness and/or experience.

โ€ข Candidates looking to pursue a career incybersecurity 

โ€ข IT, cybersecurity and digital transformationdesign and implementation engineers 

โ€ข IT, cybersecurity and digital transformationtechnical operations and business analysts 

โ€ข IT, cybersecurity and digital transformationspecialists including pen testers, ethicalhackers, software and application developers,auditors, and investigators

Kontakt oss: Kurs@sgpartner.no

Kurskode: HPE_H0DV9S Kateegori: ,

Relaterte kurs