Skip to main Content

NCSP Bootcamp Certification

  • Course Code H0DV9S
  • Duration 5 days

Public Classroom Price

eur3,900.00

excl. VAT

Request Group Training Add to Cart

Course Delivery

This course is available in the following formats:

  • Company Event

    Event at company

  • Public Classroom

    Traditional Classroom Learning

  • Virtual Learning

    Learning that is virtual

Request this course in a different delivery format.

Course Overview

Top
This APMG accredited training program is targeted at IT and cybersecurity professionals who wish to become certified on how to operationalize the NIST-CFS across an enterprise and its supply chain. The NCSP Bootcamp program teaches the knowledge to prepare for the NSCP Boot Camp exam (Foundation + Practitioner) plus the skills and abilities to design, build, test, manage and improve a cybersecurity program based on the NCSF. This course essentially combines the NCSP Foundation and Practitioner, but with only one exam instead of two (if the foundation and Practitioner are taken separately)

Course Schedule

Top

Target Audience

Top
  • Candidates looking to pursue a career in cybersecurity
  • IT, cybersecurity and digital transformation design and implementation engineers
  • IT, cybersecurity and digital transformation technical operations and business analysts
  • IT, cybersecurity and digital transformation specialists including pen testers, ethical hackers, software and application developers, auditors, and investigators

Course Objectives

Top

Upon completion of this course, students will have:

  • The skills and abilities to design, build, test, manage and improve a cybersecurity program based on the NCSF
  • The knowledge to prepare for the NSCP Boot Camp exam (Foundation + Practitioner)

Course Content

Top

H0DV7S: NCSP Foundation Training

Digital Transformation

  • Explain what it means to “become digital”
  • Discuss the difference between industrial and digital era enterprises
  • Explain how cybersecurity supports an organization’s digital transformation

Understanding Cyber Risks

  • Explain the cyber risk equation
  • Identify and explain each component of the cyber risk equation
  • Describe the basics of a risk assessment

NIST Cybersecurity Framework Fundamentals

  • Explain the genesis of the NIST-CSF
  • List and describe the components of the NIST-CSF
  • Describe each of the NIST-CSF’s objectives

Core Functions, Categories and Subcategories

  • Understand and explain

               – Core functions

               – Framework categories

               – Informative references

Implementation Tiers and Profiles

  • Understand and explain Implementation Tier terms and their use
  • Understand and explain each Implementation Tier
  • Understand and describe the three risk categories
  • Understand and explain Profiles and their use
  • Understand and describe the use of Profiles when

               – Determining gaps

               – Identifying and prioritizing focus areas

Cybersecurity Improvement

  • Understand and explain how an organization can approach the adoption and adaptation of the NIST-CSF
  • Understand and describe how to implement cybersecurity controls using an incremental improvement approach
  • Understand and describe CIIS as a practice within an organization

 

0DV8S: NCSP Practitioner Training

Chapter 1: Course Introduction

  • Course organization
  • Setting the stage

Chapter 2: Digital Transformation

  • DX as a practitioner
  • DX in the context of cybersecurity
  • Cybersecurity as a DX catalyst

Chapter 3: Threat Landscape

  • Threat actors: Agile and Creative
  • Attacks
  • Challenges
  • Organizational response to threat landscape
  • Absolute prevention not possible

Chapter 4: The Controls

  • Initiation and basic
  • Foundation
  • Organizational and recovery

Chapter 5: Adopt and Adapt

  • The context of adopt and adapt
  • Cybersecurity and culture
  • Where we are

Chapter 6: Adaptive Way of Working

  • Introduction to adaptive way to work
  • How to get started

Chapter 7: Rapid Adoption and Rapid

  • Adaptation FastTrack™
  • Rapid adoption
  • Rapid adaptation

Chapter 8: CIIS as a Practice

  • Ongoing practice of cybersecurity
  • NIST 7-step improvement
  • Cybersecurity Maturity Model Certification (CMMC)
  • Integrate cybersecurity

Course Prerequisites

Top
  • Candidates must have a reasonable amount of cyber security awareness and/or experience

Further Information

Top

Credits Earned

24 PDU & 24 CEU Credits

Delivery

The course will be delivered using ILT (traditional classroom with a live instructor) or vILT (a real instructor delivering the course over the internet). Draining Materials provided to each registration will include the following: Student book in PDF format - Enables note taking during the course. Video Library - Access to the self-study / self-paced videos will be provided (a 12 month license (renewable)) for future reference purposes