Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Selection And Implementation Of Cybersecurity Risks Controls

    Posted By: ELK1nG
    Selection And Implementation Of Cybersecurity Risks Controls

    Selection And Implementation Of Cybersecurity Risks Controls
    Published 11/2023
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 1.71 GB | Duration: 3h 3m

    Selection and Implementation of Cybersecurity Risks Controls

    What you'll learn

    Student will learn how to holistically apply a 360 degree approach to the selection and implementation of security risks control measures

    Key considerations for the identification, selection & implementation of security controls

    High-level process of selecting controls to protect\ address idenitfied security risks on ecommerce web server

    The role of governance in the effective selection and implementation of cybersecurity controls

    Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF)

    Requirements

    Basic to advance understanding of information security principles.

    Description

    This course was developed as a means of helping entry-level as well as seasoned cybersecurity professionals, to develop a more holistic rather than isolated approach to implementing controls to address cyber or information security risks. The content of this course is as follows:SECTION 1 TOPICS1a-Course Intro1b-Course Intro- The Case at hand2-About the course3-Meet your Instructor-Mentor4-Course Roadmap5-Approach to Control Selection_ pt16-Approach to Control Selection_ pt27-Applying same approach to real Data Breaches at a high-level8-Introduction to security controls9-Key considerations for the identification- selection & implementation of controls10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis11-Cost Benefit Analysis associated with controls selection12-Technology integration, Operational impact, continuous monitoring, Employee training13-Regulatory Compliance, Incident Response PlanningSECTION 2 TOPICS14-High-level process of selecting controls to protect eCommerce web server-Pt114-High-level process of selecting controls to protect eCommerce web server-Pt215-Steps involved in assessing the identified cyber risks in web server16-Identify assets, identify threats, identify vulnerabilities 17-Determine likelihood, Impact, Calculate risk18-Documenting Cybersecurity Risk Assessment Report-Pt 218-Documenting Cybersecurity Risk Assessment Report-Pt 119-The role of governance in the effective selection and implementation of cybersecurity controls 20-Why not implement frameworks that already have recommended controls21-Challenges, considerations & disadvantages associated with implementing frameworks-Pt 121-Challenges, considerations & disadvantages associated with implementing frameworks-Pt 222-When to,  versus when not to use frameworks for the selection and implementation of controls23-Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF) Pt123-Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF) Pt224-Implementation Plan for identified controls25- Measuring the effectiveness of implemented controls26-Putting it all together-The Selection and Implementation of Cybersecurity Risks Controls27-Course Recap-ENDASSIGNMENT-Research

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Lecture 2 1b-Course Intro- The Case at hand

    Lecture 3 2-About the course

    Lecture 4 3-Meet your Instructor-Mentor

    Lecture 5 4-Course Roadmap

    Lecture 6 5-Approach to Control Selection_ pt1

    Lecture 7 6-Approach to Control Selection_ pt2

    Lecture 8 7-Applying same approach to real Data Breaches at a high-level

    Lecture 9 8-Introduction to security controls

    Lecture 10 9-Key considerations for the identification- selection & implementation of contr

    Lecture 11 10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis

    Lecture 12 11-Cost Benefit Analysis associated with controls selection

    Lecture 13 12- Technology integration, operational impact, continuous monitoring, employee

    Lecture 14 13-Regulatory Compliance, Incident Response Planning

    Section 2: SECTION-2

    Lecture 15 14-High-level process of selecting controls to protect ecommerce web server-Pt1

    Lecture 16 14-High-level process of selecting controls to protect ecommerce web server-Pt2

    Lecture 17 15-Steps involved in assessing the identified cyber risks in web server

    Lecture 18 16-Identify assets, identify threats, identify vulnerabilities

    Lecture 19 17-Determine likelihood, Impact, Calculate risk

    Lecture 20 18- Documenting Cybersecurity Risk Assessment Report-Pt1

    Lecture 21 18-Documenting Cybersecurity Risk Assessment Report-Pt2

    Lecture 22 19- The role of governance in the effective selection and implementation of cybe

    Lecture 23 20-Why not implement frameworks that already have recommended controls

    Lecture 24 21-Challenges, & considerations associated with implementing frameworks-pt1

    Lecture 25 21-Challenges, & considerations associated with implementing frameworks-pt2

    Lecture 26 22-When to use frameworks for the selection and implementation of controls

    Lecture 27 23-Selecting and implementing cybersecurity controls based on NIST CSF PT1

    Lecture 28 23-Selecting and implementing cybersecurity controls based on NIST CSF PT2

    Lecture 29 24-Implementation Plan for selected controls

    Lecture 30 25- Measuring the effectiveness of implemented controls

    Lecture 31 Putting it all together-The Selection and Implementation of Cyber Risks controls

    Lecture 32 27-Course Recap-END

    Section 3: Assignment- To reinforce knowledge gained

    Section 4: Course Resources

    Lecture 33 Course Resources

    This course id developed for entry-level cybersecurity professionals, seeking to enhance thier skillset.