kingers Posted March 30 Report Share Posted March 30 Implement Version 2 Of Nist Cybersecurity Framework Published 3/2025 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 1.79 GB | Duration: 2h 43mDesigned for hands-on practitioners who really want to know how the NIST Cybersecurity Framework works! What you'll learn Understand the foundations of the NIST Cybersecurity Framework Be able to use the Framework Core Be able to use the Framework Tiers Be able to use the Framework Implementation Profile Requirements No special tools are required, just a willingness to learn about using the NIST Cybersecurity Framework Description The NIST Cybersecurity Framework isn't just another dusty document. It's a practical tool that can help protect your organization. But many people tell me they're confused about how to actually use it.We've been implementing the Framework with paying customers for over 8 years, so I've seen lots of confusion.In this course, I'm going to demystify the Framework, show you how to implement it, and give you a straight-forward method along with a free tool for automating the workflow and reporting.You'll start by learning the basics of the NIST Cybersecurity Framework, like who made it and who can use it.Then, you'll dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Implementation Profiles.You'll also review case studies from diverse organizations across the globe, including a critical infrastructure organization, a large global business, and others.Finally, we'll spend most of our time learning how to implement the framework within your own organization by making a Cyber Risk Management Action Plan (CR-MAP). This CR-MAP of your organization will discover your time five cyber risks and help you to create a mitigation plan to reduce your cyber risk and make your organization more cyber resilient. You'll also get a free bonus digital workbook that helps you conduct a CR-MAP step-by-step.Remember: Cyber criminals don't care how big or small your organization is. They only care if you're an easy target.The Framework helps make you a harder target. Let's get going! Overview Section 1: Introduction to the NIST Cyber Security Framework Lecture 1 Introduction Lecture 2 Business Value of Framework Lecture 3 Who Can Use The Framework? Lecture 4 Understanding the Core Lecture 5 Understanding the Tiers Lecture 6 Understanding the Profiles Lecture 7 Understanding the Online Resources Section 2: Understanding the NIST Cybersecurity Framework Lecture 8 Chapter Introduction Lecture 9 Govern Function and Activities Lecture 10 Identify Function and Activities Lecture 11 Protect Function and Activities Lecture 12 Detect Function and Activities Lecture 13 Respond Function and Activities Lecture 14 Recover Function and Activities Lecture 15 Controls and Outcomes Section 3: Real World Case Studies Lecture 16 Chapter Introduction Lecture 17 Cimpress (Promotional Products) Lecture 18 University of Kansas Medical Center Lecture 19 CRO Customer Case Study #1 Lecture 20 CRO Customer Case Study #2 Section 4: Implementing Phase One of the CR-MAP Lecture 21 Chapter Introduction Lecture 22 CR-MAP Overview Lecture 23 Widen Your Scope Lecture 24 Get Buy-In Lecture 25 Select Interviewees Lecture 26 Generate Questionnaire Lecture 27 Choose Target Scores Lecture 28 Conduct Interviews Lecture 29 Compile and Analyze Scores Lecture 30 Identify Top 5 Cyber Risks Section 5: Implementing Phase Two of the CR-MAP Lecture 31 Chapter Introduction Lecture 32 Close Your Gaps Lecture 33 Total Cost of Ownership Lecture 34 Business Value Analysis Lecture 35 Dashboard and Roadmap Lecture 36 Internal Marketing Lecture 37 External Marketing Section 6: Implementing Phase Three of the CR-MAP Lecture 38 Chapter Introduction Lecture 39 Phase Three Overview Lecture 40 Monthly Check-ins Lecture 41 Quarterly Reviews Lecture 42 Annual Cybersecurity Summit Section 7: Conclusion Lecture 43 BONUS: Conclusion Cybersecurity Professionals,Information Technology Practitioners,Risk Management Practitioners,Business Leaders and ExecutivesAusFilehttps://ausfile.com/29oqtdgswjc1/Implement.version.2.of.NIST.Cybersecurity.Framework.part1.rarhttps://ausfile.com/9yrrjlg30cqb/Implement.version.2.of.NIST.Cybersecurity.Framework.part2.rarRapidGatorhttps://rapidgator.net/file/314b6c55a315d165e7251c0579544b32/Implement.version.2.of.NIST.Cybersecurity.Framework.part1.rarhttps://rapidgator.net/file/e5795ab1521a7a31b5d66f0af1f75f2e/Implement.version.2.of.NIST.Cybersecurity.Framework.part2.rarTurboBithttps://turbobit.net/8kqiddxpc35q/Implement.version.2.of.NIST.Cybersecurity.Framework.part1.rar.htmlhttps://turbobit.net/mliina9dhat1/Implement.version.2.of.NIST.Cybersecurity.Framework.part2.rar.htmlFileFactory Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now