kingers Posted March 15 Report Share Posted March 15 Implementing A Cybersecurity Program Published 11/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 9.03 GB | Duration: 4h 26mHow to Develop a Comprehensive Cybersecurity Program for Your Organization What you'll learn Explain functions and components of a cybersecurity program and how it reduces risk for the business Explain core cybersecurity concepts Explain possible approaches for implementing a cybersecurity program and how to choose an approach that has the best return on investment for an organization Explain cybersecurity steps that should be taken right away Explain other factors and considerations for prioritizing the implementation tasks of a cybersecurity program List common laws and regulations and explain who may have to comply with those laws and regulations Explain common business documents and policies and their role in protecting the business Explain common cybersecurity program functions and their role in protecting the business Explain risk tolerance Explain different methods for assessing risk Explain the how to perform an asset and risk assessment Explain how to determine solutions and ROI Explain how to compare and contrast solutions and ROI to prioritize work Explain common cybersecurity frameworks and their purpose Explain how to implement a framework Requirements No prior knowledge or experience needed Description Looking to set up a cybersecurity program at your company? This course will cover tips and tricks of setting up an IT program from the ground up. The focus will be on the process and how to efficiently and quickly set up the program. The course will cover the following:Define elements of a cybersecurity programChoosing an implementation approachImplementing high value, low cost changesHow to assesses companies risk toleranceDetermining and organizing workChoosing a cybersecurity frameworkThis course is for:Anyone looking into developing a cybersecurity program. The course is designed for someone more technical or leading a technical department and is probably best suited for companies with at least one person devoted to IT.A note from the instructor: The first time I set up a cybersecurity program, there weren't a lot of resources on the process. Within two years I took the company from no security program to being fully SOC 2 Type 2 Compliant. This was an incredible feat considering the lack of resources. I've compiled what made this project so successful into this course, as well as added additional tips and tricks that I've learned since.Who Should Take this Course:Anyone wanting to set up a cybersecurity program for their business or organizationMost ideal for small or medium size companies that have at least 1 IT personWho Should Take this Course:Anyone wanting to set up a cybersecurity program for their business or organizationMost ideal for small or medium size companies that have at least 1 IT personWhy take the course from me?Experience: I've been in the IT world since 2000, have a masters in computers, and over 20 industry standard certificationsKnow how to Teach: I was trained as an instructor by the USAF, have a bachelors in education, teaching since 1997, and well over 6,000 hours of classroom instruction time.I've been a hiring manager since 2010, I know what skill sets employers are looking for.TechKnowSurge's Unique ApproachYour instructor has training and years of experience as an educator, as a technician, and as a leader. The course implements the following features:Microstep lectures and segmented videos that meters learning into bite size chunks. It also makes it easy to go back and review concepts when needed.Extensive coverage of topics to make sure topics are explained fullyWell-organized content. A tremendous amount of effort has been placed on what order content should be delivered to maximize learning and minimizing confusion.A focus on pedagogy. A funny name, but your instructor has a deep understanding of educational theory and what drives learning.Module overviews explaining what to expect for each module and sets a mindset for why the information is important to learn.Video intros, overviews, and summaries to explain the intention of each video, reinforce learning, and prepare you for success.High quality and engaging videos that use graphics, great explanations, and analogies to explain complex topics in an easy to understand way.Real world application. Step beyond just the theory. Your instructor has real world experience and will share that with you throughout the course.Content and OverviewThis well organized course will has the following modules:Welcome and Getting Started: Prepare yourself for efficiently and successfully completing the course. You'll get an overview of what the course is all about and what you should expect out of it.What is a Cybersecurity Program: Let's start by exploring what is a cybersecurity program, what are it's core functions, and who it mitigates risk for a business or organization. We'll also cover some core cybersecurity definitions and concepts that we'll use throughout the course.Implementation Approaches: We'll set the stage for the three main approaches that I would recommend: Start with action; Start with an Assessment; and Start with a Framework. This will be an overview of the three approaches. We'll also have a video about change management from a human perspective, that is how to roll out proper change management to help gain the most acceptance for the changes you would be making for the organization.Lane 1: Start with Action: A cybersecurity program is about making changes that will put the company in the best position for success. This requires action. Delaying action could mean you putting the business at risk. We'll cover considerations for how to choose which actions are the right first steps for you.Regulatory Compliance: Laws and regulations continue to evolve and develop to protect consumers. Those businesses that don't take the new regulatory compliance seriously, may find themselves irrelevant. We'll cover some of the larger, more common laws and regulations that you may need to implement for your business. We'll get into what the regulation is, who must comply with it, and some of the highlights of the law.Critical Cybersecurity Documents: Some documents and policies are requirements, while others are important to legally protect the business. We'll cover common documents an organization should consider. We'll discuss who should implement, how the document is used, and look at some examples of the documents.Cybersecurity Functions: Business operations can be broken down into different individual functions. We'll get into core functions that can be implemented that will help protect the business from risk.Lane 2: Start with an Assessment: One of the core functions of a cybersecurity program is to assess risk, determine solutions, prioritize solutions, and then take action. By starting with an assessment, you can prioritize projects in a way that gives the organization the best return on investment. We'll cover what risk assessments look like and the basics of how to perform a risk assessment for your organization.Lane 3: Start with a Framework: A framework helps establish a comprehensive cybersecurity program. Without it, an organization could find itself overlooking risk in areas of its operations. A framework can identify those areas and ensure proper controls are in place to protect those areas.Wrap Up: Time to wrap up the course and provide any final thoughts.Instructor BioTechKnowSurge (Andrew Grimes) has been in the tech industry since 2000 and even longer as an Instructor. He started out as a Survival Instructor for the United States Air Force (USAF) in 1997. When he got out of the military, he started teaching computer classes. Wanting to advance his technical skills, he became a contractor working on a wide range of technologies while teaching technology college courses in the evening. Overtime, he became a hiring manager, director, and leaderHis background includes:Building a security program within 2 years to include becoming SOC 2 Type 2 compliantLeading and maximizing efficiency of IT, Security, and DevOps teamsManaging SaaS company infrastructure with millions of active usersManaging small, medium, and large IT InfrastructuresMigrating technologies to the cloudManaging multi-million dollar budgets and reducing overall budget spend year over yearUtilizing various project management techniques such as waterfall, scrum and Kanban to maximize efficiency and successBachelors in Workforce EducationMasters in Computer Resource and Information ManagementOver 6,000 hours of teaching experienceOver 20 industry standard certifications.Past student reviews:"Andrew is absolutely the best instructor I've had throughout the course of my education. He is extremely knowledgeable when it comes to all things network and IT-related. Because of the education he provided, I am now working in the network engineering field, and I could not have done it without his expert guidance." ~Michael B."Andrew was hands down my favorite instructor since enrolling" "He has great skills as an instructor, and I've learned a lot from his classes." ~Jeff S."As an instructor, he is thorough, articulate, patient and positive. He genuinely cares that his students fully comprehend the curriculum. I have a great deal of respect for Andrew. I can't recommend him highly enough." ~Dan H."I found Andrew to be one of the best Instructors" "He presents the information with real world applications, which helped to reinforce the concepts presented in the Cisco Certification track." "I am truely thankful to have had him as my teacher." ~Dan M."Andrew is very knowledgeable and brings his practical business experience with him. He expresses himself very well and treats everyone with respect. He explains very complicated concepts in a manner that is easy to understand." "It is without reservation that I would recommend Andrew as a business professional and/or teacher." ~Adam C."Andrew is an excellent instructor and more." "Andrew is the kind of teacher that you never forget." ~ William C."Andrew Grimes is a first rate instructor who genuinely cares about the success of his students. I was fortunate to have Andrew as my instructor." "I highly recommend Andrew as an instructor and IT professional." ~Paul C."Andrew is a great instructor who really cares whether his students grasp the concepts he teaches. He has a passion for teaching that many couldn't muster." ~Patrick R."He was a great teacher and I would gladly take a class under him again." ~Joshua R.".his style of teaching is accommodating for any level, that a student is starting off at, either beginning or advance in IT world." ~Paul W."He fosters a multidimensional environment of learning in which students of diverse abilities excel." ~Mark B"Andrew Grimes was a great Data Networks and Telecommunications Instructor." "I would highly recommend him to any who desires to further their education." ~ Tommy S. Overview Section 1: Welcome and Getting Started Lecture 1 Welcome Lecture 2 How to Navigate This Course Lecture 3 Course Overview Lecture 4 Syllabus Lecture 5 Meet Your Instructor Section 2: What is a Cybersecurity Program? Lecture 6 Module Intro Lecture 7 What is a Cybersecurity Program? Lecture 8 Why have a Cybersecurity Program? Lecture 9 How does a Security Program Mitigate Risk? Lecture 10 Security Program Operations Lecture 11 Cybersecurity Frameworks Lecture 12 Core Cybersecurity Concepts Section 3: Implementation Approach Lecture 13 Module Intro Lecture 14 Payoff Model Lecture 15 Choosing an Implementation Approach Lecture 16 Change Management Section 4: Lane 1: Start with Action Lecture 17 Module Intro Lecture 18 The Basics Lecture 19 Requirements Section 5: Regulatory Compliance Lecture 20 Module Intro Lecture 21 Laws and Regulations Overview Lecture 22 Common Regulatory Components Lecture 23 General Data Protection Regulation (GDPR) Lecture 24 California Consumer Privacy Act (CCPA) Lecture 25 Payment Card Industry Data Security Standard (PCI DSS) Lecture 26 Sarbanes-Osxley Act (SOX) Lecture 27 Health Insurance Portability and Accountability Act (HIPAA) Lecture 28 Cybersecurity Maturity Model Certification (CMMC) Lecture 29 Gramm-Leach-Bliley Act (GLBA) Lecture 30 Children's Online Privacy Protection Act (COPPA) Lecture 31 Family Educational Rights and Privacy Act (FERPA) Section 6: Critical Security Documents Lecture 32 Module Intro Lecture 33 Written Information Security Plan (WISP) Lecture 34 Acceptable Use Policy (AUP) Lecture 35 Password Policy Lecture 36 Privacy Policy Lecture 37 Service Level Agreements (SLA) Lecture 38 Operational-Level Agreement Lecture 39 Privacy-Level Agreement Lecture 40 Terms of Service (ToS) Lecture 41 Data Retention Policy Lecture 42 Master Service Agreements (MSA) Lecture 43 Statement of Work (SoW) Lecture 44 Non-Disclosure Agreements (NDA) Lecture 45 Memorandum of Understanding (MOU) Lecture 46 Interconnect Security Agreement (ISA) Section 7: Security Operations Lecture 47 Module Intro Lecture 48 Compliance Management Lecture 49 Risk Management Lecture 50 Asset Acquisition and Management Lecture 51 Vulnerability Management Lecture 52 Patch Management Lecture 53 Vendor and Supply Chain Management Lecture 54 Personnel Management Lecture 55 Identity and Access Management (IAM) Lecture 56 Security Awareness & Training Management Lecture 57 Change Management Lecture 58 Data Management Lecture 59 Monitoring and Alerting Lecture 60 Incident Management Lecture 61 Contingency Planning Lecture 62 Auditing and Assessments Lecture 63 Program Management Section 8: Lane 2: Start with an Assessment Lecture 64 Module Intro Lecture 65 Determining Risk Tolerance Lecture 66 Risk Assessment Lecture 67 Asset Risk Assessment Lecture 68 DEMO: Asset Inventory and Assessment Lecture 69 Identify Solutions and ROI Lecture 70 DEMO: Solutions and ROI Lecture 71 Prioritizing Work Section 9: Lane 3: Start with a Framework Lecture 72 Module Intro Lecture 73 Start with a Framework Lecture 74 Implementing a Framework Lecture 75 Determining Work Section 10: Wrap up Lecture 76 Review Lecture 77 Course Wrap up Anyone wanting to set up a cybersecurity program for their business or organization,Most ideal for small or medium size companies that have at least 1 IT personTurboBithttps://turbobit.net/j959jw16qcro/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part01.rar.htmlhttps://turbobit.net/2n3ara9p3v0u/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part02.rar.htmlhttps://turbobit.net/qnudgiq0dw6e/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part03.rar.htmlhttps://turbobit.net/6jbu89reevas/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part04.rar.htmlhttps://turbobit.net/6t9f4wqsgj4j/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part05.rar.htmlhttps://turbobit.net/pdt0109jco51/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part06.rar.htmlhttps://turbobit.net/52fp7e5elvaf/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part07.rar.htmlhttps://turbobit.net/ktr5kf13eiac/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part08.rar.htmlhttps://turbobit.net/qxvzt11jim3m/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part09.rar.htmlhttps://turbobit.net/jnst3t9c0a8h/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part10.rar.htmlRapidGatorhttps://rapidgator.net/file/2551e8cbd98582d074655ba44468178f/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part01.rarhttps://rapidgator.net/file/6c4f044245d4b9e451c8a2d6726df47c/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part02.rarhttps://rapidgator.net/file/8aec7673bc52d194c9e15880bff82a0c/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part03.rarhttps://rapidgator.net/file/befc6279ce12e46fc64ea39a939ef29a/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part04.rarhttps://rapidgator.net/file/e56ec73528057c73fc1455f82bf3e884/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part05.rarhttps://rapidgator.net/file/fbf5577f5dbea364254a23530a20996d/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part06.rarhttps://rapidgator.net/file/ddd238706ff7f8a488cc79951152aa27/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part07.rarhttps://rapidgator.net/file/53e2bf6e16a469d6a5998249157cfe6a/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part08.rarhttps://rapidgator.net/file/0dba2a30c456f0f705e4bf886bfa3e2e/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part09.rarhttps://rapidgator.net/file/ea7c58458c75863acbaadef31349c7c0/.Implementing.a.Cybersecurity.Program.-.TechKnowSurge.2024.10.part10.rarFileFactory Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now