HPE_H0DV9S NCSP Boot Camp Certification
Digital Transformation • Explain what it means to “become digital”• Discuss the difference between industrial and digital era enterprises • Explain how cybersecurity supports an organization'sdigital Transformation Understanding Cyber Risks • Explain the cyber risk equation• Identify and explain each component of the cyber risk equation • Describe the basics of a risk assessment NIST Cybersecurity Framework Fundamentals • Explain the genesis of the NIST-CSF• List and describe the components of the NIST-CSF• Describe each of the NIST-CSF's objectivesCore Functions, Categories and Subcategories • Understandand explain– Core functions – Framework categories– Informative references Implementation Tiers and Profiles • Understand and explain Implementation Tier terms and their use• Understand and explain each Implementation Tier• Understand and describe the three risk categories• Understand and explain Profiles and their use• Understand and describe the use of Profiles when– Determining gaps– Identifying and prioritizing focus areasCybersecurity Improvement • Understand and explain how an organization canapproach the adoption and adaptation of the NIST-CSF• Understand and describe how to implement cybersecurity controls using an incremental improvement approach• Understand and describe CIIS as a practice within an Organization Chapter 1: Course Introduction • Course organization • Setting the stage Chapter 2: Digital Transformation • DX as a practitioner• DX in the context of cybersecurity• Cybersecurity as a DX catalyst Chapter 3: Threat Landscape • Threat actors: Agile and Creative• Attacks• Challenges• Organizational response to threat landscape• Absolute prevention not possible Chapter 4: The Controls • Initiation and basic• Foundation• Organizational and recovery Chapter 5: Adopt and Adapt • The context of adopt and adapt• Cybersecurity and culture • Where we are Chapter 6: Adaptive Way of Working • Introduction to adaptive way to work • How to get started Chapter 7: Rapid Adoption and Rapid Adaptation FastTrack™ • Rapid adoption • Rapid adaptation Chapter 8: CIIS as a Practice • Ongoing practice of cybersecurity• NIST 7-step improvement• Cybersecurity Maturity Model Certification (CMMC)• Integrate cybersecurity
COURSE OBJECTIVE:
Upon completion of this course, studentswill have:• The skills and abilities to design, build, test, manage and improve a cybersecurity program based on the NCSF • The knowledge to prepare for theNSCP Boot Camp exam (Foundation +Practitioner)
TARGET AUDIENCE:
• Candidates looking to pursue a career incybersecurity • IT, cybersecurity and digital transformationdesign and implementation engineers • IT, cybersecurity and digital transformationtechnical operations and business analysts • IT, cybersecurity and digital transformationspecialists including pen testers, ethicalhackers, software and application developers,auditors, and investigators
COURSE PREREQUISITES:
Candidates must have a reasonable amount of cyber security awareness and/or experience.
COURSE CONTENT:
H0DV9S (hpe.com)
FOLLOW ON COURSES:
Not available. Please contact.