Selection and Implementation of Cybersecurity Risks Controls

Selection and Implementation of Cybersecurity Risks Controls

Ratings 3.88 / 5.00
Selection and Implementation of Cybersecurity Risks Controls

What You Will Learn!

  • Student will learn how to holistically apply a 360 degree approach to the selection and implementation of security risks control measures
  • Key considerations for the identification, selection & implementation of security controls
  • High-level process of selecting controls to protect\ address idenitfied security risks on ecommerce web server
  • The role of governance in the effective selection and implementation of cybersecurity controls
  • Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF)

Description

This course was developed as a means of helping entry-level as well as seasoned cybersecurity professionals, to develop a more holistic rather than isolated approach to implementing controls to address cyber or information security risks. The content of this course is as follows:

SECTION 1 TOPICS

1a-Course Intro

1b-Course Intro- The Case at hand

2-About the course

3-Meet your Instructor-Mentor

4-Course Roadmap

5-Approach to Control Selection_ pt1

6-Approach to Control Selection_ pt2

7-Applying same approach to real Data Breaches at a high-level

8-Introduction to security controls

9-Key considerations for the identification- selection & implementation of controls

10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis

11-Cost Benefit Analysis associated with controls selection

12-Technology integration, Operational impact, continuous monitoring, Employee training

13-Regulatory Compliance, Incident Response Planning

SECTION 2 TOPICS

14-High-level process of selecting controls to protect eCommerce web server-Pt1

14-High-level process of selecting controls to protect eCommerce web server-Pt2

15-Steps involved in assessing the identified cyber risks in web server

16-Identify assets, identify threats, identify vulnerabilities

17-Determine likelihood, Impact, Calculate risk

18-Documenting Cybersecurity Risk Assessment Report-Pt 2

18-Documenting Cybersecurity Risk Assessment Report-Pt 1

19-The role of governance in the effective selection and implementation of cybersecurity controls

20-Why not implement frameworks that already have recommended controls

21-Challenges, considerations & disadvantages associated with implementing frameworks-Pt 1

21-Challenges, considerations & disadvantages associated with implementing frameworks-Pt 2

22-When to,  versus when not to use frameworks for the selection and implementation of controls

23-Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF) Pt1

23-Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF) Pt2

24-Implementation Plan for identified controls

25- Measuring the effectiveness of implemented controls

26-Putting it all together-The Selection and Implementation of Cybersecurity Risks Controls

27-Course Recap-END

ASSIGNMENT-Research


Who Should Attend!

  • This course id developed for entry-level cybersecurity professionals, seeking to enhance thier skillset.

TAKE THIS COURSE

Tags

Subscribers

118

Lectures

33

TAKE THIS COURSE