Skip to main Content

NCSP Foundation Training

  • Course Code H0DV7S
  • Duration 1 day

Course Delivery

Public Classroom Price

£1,200.00

excl. VAT

Request Group Training Add to Cart

Course Delivery

This course is available in the following formats:

  • Public Classroom

    Traditional Classroom Learning

Request this course in a different delivery format.

Course Overview

Top

Digital Transformation

• Explain what it means to “become digital”

• Discuss the difference between industrial and digital era

enterprises

• Explain how cybersecurity supports an organization’s digital

Transformation

 

Understanding Cyber Risks

• Explain the cyber risk equation

• Identify and explain each component of the cyber risk

equation

• Describe the basics of a risk assessment

NIST Cybersecurity Framework Fundamentals • Explain the genesis of the NIST-CSF

• List and describe the components of the NIST-CSF

• Describe each of the NIST-CSF’s objectives

 

Core Functions, Categories and Subcategories

• Understand and explain

– Core functions

– Framework categories

– Informative references

 

Implementation Tiers and Profiles

• Understand and explain Implementation Tier terms and

their use

• Understand and explain each Implementation Tier

• Understand and describe the three risk categories

• Understand and explain Profiles and their use

• Understand and describe the use of Profiles when

– Determining gaps

– Identifying and prioritizing focus areas

 

Cybersecurity Improvement

• Understand and explain how an organization can

approach the adoption and adaptation of the NIST-CSF

• Understand and describe how to implement cybersecurity

controls using an incremental improvement approach

• Understand and describe CIIS as a practice within an

organization

Course Schedule

Top

Target Audience

Top

• Candidates looking to pursue a career in

cybersecurity

• IT, cybersecurity and digital transformation

design and implementation engineers

• IT, cybersecurity and digital transformation

technical operations and business analysts

• IT, cybersecurity and digital transformation specialists including pen testers, ethical

hackers, software and application developers,

auditors, and investigators

Course Objectives

Top

At the conclusion of this course, the student will be able to:

• Use the Framework as a key part of a

systematic process for identifying, assessing,

and managing cybersecurity risk

• Overlay the Framework onto current

processes to determine gaps in current

cybersecurity risk approach and develop a

roadmap

• Use the Framework as a cybersecurity risk

management tool

• Determine activities that are most important

to critical service delivery and prioritize

expenditures to maximize the impact of the

investment.

Course Prerequisites

Top

Working knowledge of IT