NCSP Foundation Training
- Course Code H0DV7S
- Duration 1 day
Course Delivery
Jump to:
Course Delivery
This course is available in the following formats:
-
Public Classroom
Traditional Classroom Learning
Request this course in a different delivery format.
Course Overview
TopDigital Transformation
• Explain what it means to “become digital”
• Discuss the difference between industrial and digital era
enterprises
• Explain how cybersecurity supports an organization’s
digital
Transformation
Understanding Cyber Risks
• Explain the cyber risk equation
• Identify and explain each component of the cyber risk
equation
• Describe the basics of a risk assessment
NIST Cybersecurity Framework Fundamentals • Explain the
genesis of the NIST-CSF
• List and describe the components of the NIST-CSF
• Describe each of the NIST-CSF’s objectives
Core Functions, Categories and Subcategories
• Understand and explain
– Core functions
– Framework categories
– Informative references
Implementation Tiers and Profiles
• Understand and explain Implementation Tier terms and
their use
• Understand and explain each Implementation Tier
• Understand and describe the three risk categories
• Understand and explain Profiles and their use
• Understand and describe the use of Profiles when
– Determining gaps
– Identifying and prioritizing focus areas
Cybersecurity Improvement
• Understand and explain how an organization can
approach the adoption and adaptation of the NIST-CSF
• Understand and describe how to implement cybersecurity
controls using an incremental improvement approach
• Understand and describe CIIS as a practice within an
organization
Course Schedule
TopTarget Audience
Top• Candidates looking to pursue a career in
cybersecurity
• IT, cybersecurity and digital transformation
design and implementation engineers
• IT, cybersecurity and digital transformation
technical operations and business analysts
• IT, cybersecurity and digital transformation specialists
including pen testers, ethical
hackers, software and application developers,
auditors, and investigators
Course Objectives
TopAt the conclusion of this course, the student will be able
to:
• Use the Framework as a key part of a
systematic process for identifying, assessing,
and managing cybersecurity risk
• Overlay the Framework onto current
processes to determine gaps in current
cybersecurity risk approach and develop a
roadmap
• Use the Framework as a cybersecurity risk
management tool
• Determine activities that are most important
to critical service delivery and prioritize
expenditures to maximize the impact of the
investment.
Course Content
TopCourse Prerequisites
TopWorking knowledge of IT