Course Content:
Lesson 1 - Course Introduction
Lesson 2 - Today's Digital Economy
Topic A: What Cybersecurity is and why it's Important
Topic B: Cybersecurity's Impact on the Economy
Topic C: Basic Principle of Cybersecurity
Topic D: Critical Infrastructure, Vulnerabilities & Consequences
Topic E: What is PPD-21: Presidential Policy Directive and why it's Important?
Topic F: The Cyber Kill Chain(CKC) & Basic Cybersecurity Principles
Topic G: What are Threats, Vulnerabilities & Assets?
Topic H: What is the Difference Between a Threat and a Vulnerability?
Lesson 3 - Understanding Cyber Risks
Topic A: Understand and Explain the Terms: Risk, Asset, Vulnerability, Threat
Topic B: Determine Actions to Address Risk & Opportunities
Topic C: Establish Context
Topic D: Establish Criteria for Risk Assessment & Acceptance
Topic E: Risk
Topic F: Identify Action
Topic G: Analysis & Evaluation
Topic H: Treatment (Includes Avoidance, Modification, Sharing & Retention)
Topic I: Understand how to Capture, Document & Manage
Topic J: Risks
Topic K: Treatment Plans
Lesson 4 - The NIST Cybersecurity Framework Fundamentals
Topic A: Understand the NIST Cybersecurity Framework (NIST CSF)
Topic B: Understand & Explain the NIST CSF Objectives
Lesson 5 - Core Functions, Categories & Subcategories
Topic A: Understand & Explain the Core Functions
Topic B: Understand & Explain the Framework Categories
Topic C: Understand & Explain the Framework Subcategories
Topic D: Understand & Explain the Informative References
Lesson 6 - Implementation Tiers
Topic A: Understand in General Terms NIST CSF Implementation Tiers & Their Use
Topic B: Understand the four NIST CSF Implementation Tiers
Topic C: Understand the Three Risk Categories
Lesson 7 - Developing Framework Profiles
Topic A: Understand in General Terms NIST CSF Profiles & Their Use
Topic B: Understand How to Determine Biggest Gaps
Topic C: Understand & Demonstrate how to Determine Profiles through a Risk Assessment
Lesson 8 - Cybersecurity Improvement
Topic A: Understand Key Considerations for Beginning a Security Program
Topic B: Learn How to Integrate Cybersecurity into an Information Security Management System (ISMS)
Topic C: Understand How to Adopt the NIST Risk Management Framework
Topic D: Learn How to Develop Organizational Capability to Continually Improve Cybersecurity Topic E: Capabilities
Topic F: Understand the Expected Framework Adoption
Topic G: Understand Differences Between a Rules-Based Approach and a risk Based Approach
Topic H: Know the Differences Between Risk Assessment & Compliance Assessment\
Topic I: Understand the 7-Step Process Organizations use to Create a New Cybersecurity Program or Improve an Existing Program
Lesson 9 - NCSF Controls Factory Model
Topic A: Understand the NCSF Controls Factory Model (CFM)
Topic B: Learn How the CFM Converts Assets from Unmanaged to Managed
Topic C: Understand the Purpose, Goals, Objectives & Key Capabilities
Topic D: Describe How the NCSF CFM Operationalized