CyberSecurity Foundation
Short course
Inhouse
Description
-
Type
Short course
-
Level
Beginner
-
Methodology
Inhouse
-
Duration
2 Days
-
Start date
Different dates available
The CyberSecurity Foundation course is developed to teach the basic information security concepts and techniques. The knowledge captured and communicated in this course can be immediately applied by organizations around the globe to ramp up to meet their legal obligations defined by newly introduced statutory and regulatory acts.The course consists of five primary modules that address NIST Critical Security Factors which are Identify, Protect, Detect, Respond, and Recover. In addition, the course introduces GAP Assessment and four tiers of capability and maturity created to help organizations plan their CyberSecurity roadmap.The RESILIATM Practitioner course audience includes all teams across the Business, IT and Risk functions, including:
Facilities
Location
Start date
Start date
About this course
Upon completion of this course, you will be able to:* Define business environment and plan for governance, risk, and compliance* Establish access control, raise awareness, and choose protective technologies* Monitor actively for anomalies and events* Implement a response plan and apply continuous improvement* Implement a recovery plan with communications and continuous improvement
* Risk, security or cyber security managers* Business process owners* Business risk managers* Regulatory compliance managers* Project managers* Individuals responsible for cyber security within an organization
RESILIATM Foundation Certification.
Participants in this course will obtain the following benefits:* Reduce risks and threats to the Confidentiality, Integrity, and Availability of the Enterprise’s CyberSecurity Assets and System Resources by providing policies, practices and standards designed to mitigate or eliminate all known risks and threats.* Improve the effectiveness and efficiency of CyberSecurity Management by implementing a world class best practice and framework for consistent, concise security administration.* Improve effectiveness and efficiencies of the existing CyberSecurity mechanisms by formalizing new practices to monitor compliance and maintain sensitive data awareness.* Improve reassurance testing and validation outcomes by Internal Audit and External Auditors to further assure the Enterprise’s Investors, Board of Directors, and Executive Management Team that the Enterprise’s CyberSecurity Assets and System Resources are secure.* Reduce the likelihood of accidental incidents caused by Enterprise’s staff that can adversely affect the Enterprise’s reputation or liabilities by providing an ongoing CyberSecurity education and awareness program.
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 6 years
Subjects
- Risk
- Java
- Network security
- IT risk
- Python
- IOS
- IoT
- Embedded programming
- Java security
- Embedded security
Teachers and trainers (1)
Bright Solutions
Trainer
Course programme
#text-block-10 { margin-bottom:0px; text-align:left; }
Preliminary CyberSecurity Framework–Identify: Develop the organization’s knowledge of CyberSecurity to enable and empower management to address risk to organizational assets, people, information, software, hardware, telecommunications, and facilities. Key processes include:
* Business Environment
* Risk Management Strategy
* Governance
* Risk Assessment
* Asset Management
Preliminary CyberSecurity Framework–Protect: Design, test, and deploy appropriate safeguards that mitigate CyberSecurity threats to the organizations’ operations and services. Key processes include:
* Data Security
* Protective Technology
* Information Protection Processes and Procedures
* Access Control
* Awareness Training
* Maintenance
#text-block-11 { margin-bottom:0px; text-align:left; }
Preliminary CyberSecurity Framework–Detect: Design and implement effective tools that will actively monitor the organizations’ operations and services to identify events before they develop into a security incident. Key processes include:
* Anomalies and Events
* Security Continuous Monitoring
* Detection Processes
Preliminary CyberSecurity Framework–Respond: Plan, test, and operationalize CyberSecurity event and incident management processes. Train security teams to effectively engage CyberSecurity threats and test the organization’s response to events and incidents. Key processes include:
* Response Planning
* Communications
* Analysis
* Mitigation
* Improvements
Preliminary CyberSecurity Framework–Recover: Plan, test, and deploy recovery processes that will quickly return the organization to full operational capacity. Train employees designated to participate in the recovery team ensuring a smooth seamless transition from Cyber Security incidents to full operational capacity. Key processes include:
* Recovery Planning
* Improvements
* Communications
CyberSecurity Foundation