Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Nist Csf 2.0 Akylade Certified Cyber Resilience Practitioner

Posted By: ELK1nG
Nist Csf 2.0 Akylade Certified Cyber Resilience Practitioner

Nist Csf 2.0 Akylade Certified Cyber Resilience Practitioner
Published 11/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 11.13 GB | Duration: 8h 33m

A/CCRP: Get ready to lead the team or be an independent consultant!

What you'll learn

Implementation Expertise: Gain practical expertise in planning, implementing, managing, and optimizing the NIST Cybersecurity Framework

Risk Profile Coordination: Learn how to coordinate with key stakeholders and management to gain organization-wide support and establish risk profiles

Cybersecurity Risk Prioritization: Master rigorous methods for identifying and prioritizing top cybersecurity risks for efficient resource allocation

Personalized Risk Management: Acquire skills to develop a tailored and effective cybersecurity risk management strategy

Risk Posture Maintenance: Understand the processes involved in regularly updating and maintaining an organization’s cybersecurity risk posture

Continuous Improvement: Discover methods to drive continuous improvement in cyber resilience practices,

Requirements

A basic understanding of cybersecurity principles is recommended

This course builds on AKYLADE Certified Cyber Resilience Fundamentals (A/CCRF)

Description

Master the NIST Cybersecurity Framework and elevate your cybersecurity careerABOUT THE EXAMThe AKYLADE Certified Cyber Resilience Practitioner (A/CCRP) certification is designed to test your practical knowledge of the NIST Cybersecurity Framework (CSF) and how to plan, implement, manage, and optimize the material aspects of the framework for use within your own organization using a management action plan to:Exam ObjectivesCoordinate with management for organizational buy-in and establishing risk profiles for organizationsDiscover top organizational cybersecurity risks using rigorous prioritization methodsCreate a personalized cybersecurity risk management strategy tailored to an organization's unique requirementsConduct maintenance and updates to the organization's cybersecurity risk posture and perform continuous improvementWHAT SKILLS WILL YOU LEARN?Implementation ExpertiseGain practical expertise in planning, implementing, managing, and optimizing the NIST Cybersecurity Framework within your organization using a management action plan.Risk Profile CoordinationLearn how to coordinate with key stakeholders and management to gain organization-wide support and establish risk profiles specific to meet organizational requirements.Cybersecurity Risk PrioritizationMaster rigorous methods for identifying and prioritizing top cybersecurity risks to ensure efficient resource allocation within the organization.Personalized Risk ManagementAcquire skills to develop a tailored and effective cybersecurity risk management strategy that aligns with an organization’s unique needs.Risk Posture MaintenanceUnderstand the processes involved in regularly updating and maintaining an organization’s cybersecurity risk posture to adapt to evolving threats and risks.Continuous ImprovementDiscover methods to drive continuous improvement in cyber resilience practices, optimize response capabilities, and improve overall security posture.A/CCRP CERTIFICATION DOMAINSDomain 1: Management Action Plan FundamentalsPrepare for assessments, comprehend a management action plan process, achieve management buy-in, and understand the relationship between NIST Cybersecurity Framework and a management action plan processDomain 2: Phase One: Determine Top Cyber RisksIdentify, understand, assess, and present cyber risks using interviews, network diagrams, and custom questionnaires while setting NIST CSF alignment targetsDomain 3: Phase Two: Creating a Management Action PlanEvaluate and rate risk mitigation, create custom strategies, estimate costs, and develop an implementation roadmap for an organizationDomain 4: Phase Three: Maintenance and UpdatesGuide organizational leadership in allocating risk mitigation strategies, updating risk presentations, clarifying proposed measures, and conducting ongoing cybersecurity resilience review

Overview

Section 1: Introduction

Lecture 1 Welcome to the Course!

Lecture 2 Download Exam Objectives and Study Notes

Lecture 3 What to Expect on Exam Day and How to CRUSH It

Section 2: Chapter 11: The CR-MAP Process

Lecture 4 11.1 Introduction & Exam Objectives

Lecture 5 11.2 The CR-MAP Process - Featuring Dr. Gerald Auger!

Lecture 6 11.3 CR-MAP Process Phase 1 Primer: Discover Your Top Cyber Risks

Lecture 7 11.4 CR-MAP Process Phase 2 Primer: Create Your Action Plan

Lecture 8 11.5 CR-MAP Process Phase 3 Primer: Maintenance and Updates

Lecture 9 11.6 The Five Questions

Lecture 10 11.7 Fostering Security Culture

Lecture 11 11.8 Attorney-Client Privilege

Lecture 12 11.9 Conclusion and Touchpoints

Section 3: Chapter 12 - Phase 1: Discovering Top Cyber Risks

Lecture 13 12.1 Introduction & Exam Objectives

Lecture 14 12.2 Be a Compass for Risk Decisions

Lecture 15 12.3 Step 1: Widen Your Scope - Part 1 Featuring Dr. Gerald Auger!

Lecture 16 12.4 Step 1: Widen Your Scope - Part 2

Lecture 17 12.5 Step 2: Get Buy In, "Winning Heards and Minds"

Lecture 18 12.6 Step 3: Select Interviewees

Lecture 19 12.7 Step 4: Generate the Questionnaire

Lecture 20 12.8 Step 4 Continued: Scoring Criteria and Question Count

Lecture 21 12.9 Spreadsheet Lab Series Explainer

Lecture 22 12.11 Spreadsheet Lab 1: Build a CSF 2.0 Profiles Template

Lecture 23 12.12 Spreadsheet Lab 2: Build Charts

Lecture 24 12.13 Spreadsheet Lab 3: Simply CYBERCON Workshop

Lecture 25 12.14 Step 5: Determine Target Scores - Featuring Dr. Gerald Auger!

Lecture 26 12.15 Step 5: Determine Target Scores - Examples

Lecture 27 12.16 Step 6: Conduct the Interviews

Lecture 28 12.17 Step 7: Compile and Average the Scores

Lecture 29 12.18 Step 8: Communicate Your Top 5 Cyber Risks

Lecture 30 12.19 Conclusion and Touchpoints

Section 4: Chapter 13 - Phase 2: Creating a CR-MAP

Lecture 31 13.1 Introduction & Exam Objectives - Featuring Simply Cyber Jaw Jacking

Lecture 32 13.2 Responsible Disclosure Case Study: ASUS Home Routers

Lecture 33 13.3 Responsible Disclosure: 6 More Business Case Studies

Lecture 34 13.4 Keys to Success: Prioritization, Roles and Responsibilities…

Lecture 35 13.5 Key Success Factors Continued: Controlling the Rate of Change

Lecture 36 13.6 Five Steps to Developing an Action Plan

Lecture 37 13.7 (Step 1) Close the Identified Gaps - Featuring Dr Gerald Auger!

Lecture 38 13.8 Backgrounder on Supply Chain Risk Management | GV.SC-01

Lecture 39 13.9 GV.SC Requirements to Address Cybersecurity Risks in Supply Chains

Lecture 40 13.10 AI Aigmented Contract Review - Fabric Demo

Lecture 41 13.11 GV.SC Supply Chain Risks Understood, Recorded, Prioritized, Assessed…

Lecture 42 13.12 GV.SC: Example Supply Chain Risk Assessment Tools

Lecture 43 13.13 PR.AA: Identity Management, Authentication, and Access Control - Featu

Lecture 44 13.14 PR.AT Awareness and Training

Lecture 45 13.15 RS.CO: Incident Response Reporting and Communication

Lecture 46 13.16 (Step 1) Considerations: Cybersecurity Org Size and Design

Lecture 47 13.17 3TCO: 3-Year Total Cost of Ownership - Featuring Jason Dion in Cyber Cof

Lecture 48 13.18-Part 1: (Step 2) Business Value Analysis - Featuring Jason Dion!

Lecture 49 13.18-Part 2: (Step 2) Business Value Analysis

Lecture 50 13.19 (Step 3) Create a Dashboard and Roadmap

Lecture 51 13.20 (Step 4) Internal Marketing Cyber Risk Scorecard Presentation

Lecture 52 13.21 Internal Marketing Key Success Factors

Lecture 53 13.22 (Step 5) External Marketing

Lecture 54 13.23 Conclusion & Touchpoints

Section 5: Chapter 14 - Phase 3: Maintenance and Updates

Lecture 55 14.1 Introduction & Exam Objectives

Lecture 56 14.2 Equifax Data Breach Case Study

Lecture 57 14.3 Four Steps

Lecture 58 14.4 AI Augmented NIST CSF Assessment - Fabric Demo

Lecture 59 14.5 Conclusion and Touchpoints

Section 6: AKYLADE Certified Cyber Resilience Practitioner (A/CCRP) [CRP-002]

Entry-level or mid-career professionals looking to launch or lift their career in Cybersecurity