Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Python
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
NIST Cybersecurity Framework (NCSF) Practitioner
Security Training Overview

The NIST Cybersecurity Framework (NCSF) Practitioner Training course is suited for individuals working with and overseeing the technology, including CIOs, CISOs, IT Directors and Managers, IT Security personnel, and IT staff.
  • Two-day deep dive into NIST CSF Foundation concepts.
  • Focus on designing and implementing (or improving) a cybersecurity program to minimize risks and protect critical assets based on the NIST CSF.
  • Provides an analysis of various technical and business controls, including the Center for Internet Security v8 Critical Security Controls, the ISO 27001: 2013 Information Security Management System Requirements, and the NIST Risk Management Framework.
  • Includes NIST Framework certification exam and continuing education credits, such as PDUs and CEUs. Candidates receive a certificate for a passing score and a skills-gap document after completing their exam.

Security Training Course Audience

The NIST Cybersecurity Framework (NCSF) Practitioner Training course is designed for individuals within an organization who are directly involved in the planning, design, creation, implementation, and or improvement of a cybersecurity program that will follow the principles of the NIST Cybersecurity Framework. Although some aspects of the course are technical, this course also includes risk management, business controls, and other topics that would be of value to staff outside of the traditional technical audience.


Security Training Prerequisites

  • Individuals should have already taken the NIST Cybersecurity Framework (NCSF) Foundation Training course or have significant experience with the NIST Cybersecurity Framework.

Security Training Course duration

2 days

Security Training Course outline

MODULE 1: COURSE INTRODUCTION

Provides the student with information relative to the course, conduct of the course in the virtual classroom, and course materials.

MODULE 2: APPLYING NIST CSF TIERS AND PROFILES
  • Review of the NIST CSF Major Components
  • Tiers and Tier selection
  • Current and Target Profiles and the Framework Core
MODULE 3: AN EXPLORATION OF INFORMATIVE REFERENCES
  • Defining the major Informative References
  • CIS Controls v8
  • ISO/IEC 27001:2013
  • NIST SP 800-53 Rev. 5
MODULE 4: RISK MANAGEMENT IN THE NIST CSF AND NIST RMF
  • Risk Management in the NIST Cybersecurity Framework
  • Analyzing the NIST Risk Management Framework
  • Introduction and History
  • Purpose, Design, and Characteristics
  • Seven Steps
    • Prepare
    • Categorize
    • Select
    • Implement
    • Assess
    • Authorize
    • Monitor
  • Integrating the Frameworks
MODULE 5: UNDERSTANDING AND DEFENDING AGAINST REAL WORLD ATTACKS
  • Major Cybersecurity Attacks and Breaches
  • MITRE ATT&CK Matrices
  • Defense in Depth and the NIST CSF
  • Security Operations Center (SOC) activities and Security Information and Event Management (SIEM) solutions in relation to the NIST CSF
MODULE 6: ASSESSING SECURITY IN THE SUBCATEGORIES
  • Creating an Assessment Plan
  • Assigning Roles and Responsibilities
  • Tiers, Threats, Risks, Likelihoods, and Impact
MODULE 7: CREATING A WRITTEN INFORMATION SECURITY PROGRAMS (WISP)
  • The Intersection of Business and Technical Controls
  • What is a Written Information Security Program (WISP)?
  • Creating a WISP Template
  • Aligning Current Profile with a WISP
MODULE 8: A PRACTITIONER’S DEEP DIVE INTO CREATING OR IMPROVING A CYBERSECURITY PROGRAM
  • Step 1: Prioritize and Scope
    • Identifying organizational priorities
    • Aiding and influencing strategic cybersecurity implementation decisions
    • Determining scope of the implementation
    • Planning for internal adaptation based on business line/process need
    • Understanding risk tolerance
  • Step 2: Orient
    • Identifying systems and applications which support organizational priorities
    • Working with compliance to determine regulatory and other obligations
    • Planning for risk responsibility
  • Step 3: Create a Current Profile
    • Cybersecurity Assessment options
    • How to measure real world in relation to the Framework
    • Qualitative and quantitative metrics
    • Current Profile and Implementation Tiers
  • Step 4: Conduct a Risk Assessment
    • Risk assessment options (3rd party vs internal)
    • Organizational vs. system level risk assessment
    • Risk assessment and external stakeholders
  • Step 5: Create a Target Profile
    • Target Profile and Steps 1-4
    • External stakeholder considerations
    • Adding Target Profiles outside the Subcategories
  • Step 6: Determine, Analyze, and Prioritize Gaps
    • Defining and determining Gaps
    • Gap analysis and required resources
    • Organizational factors in creating a prioritized action plan
  • Step 7: Implement the Action Plan
    • Implementation team design from Executives to Technical Practitioners
    • Assigning tasks when priorities conflict
    • Considering compliance and privacy obligations
    • Taking action
    • Reporting and reviewing
MODULE 9: CONTINUOUS CYBERSECURITY IMPROVEMENT
  • Creating a continuous improvement plan
  • Implementing ongoing assessments

Please contact your training representative for more details on having this course delivered onsite or online

Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved