Selection and Implementation of Security Controls
- Description
- Curriculum
- FAQ
- Reviews
This course was developed as a means of helping entry-level as well as seasoned cybersecurity professionals, to develop a more holistic rather than isolated approach to implementing controls to address cyber or information security risks. The content of this course is as follows:
SECTION 1 TOPICS
1a-Course Intro
1b-Course Intro- The Case at hand
2-About the course
3-Meet your Instructor-Mentor
4-Course Roadmap
5-Approach to Control Selection_ pt1
6-Approach to Control Selection_ pt2
7-Applying same approach to real Data Breaches at a high-level
8-Introduction to security controls
9-Key considerations for the identification- selection & implementation of controls
10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis
11-Cost Benefit Analysis associated with controls selection
12-Technology integration, Operational impact, continuous monitoring, Employee training
13-Regulatory Compliance, Incident Response Planning
SECTION 2 TOPICS
14-High-level process of selecting controls to protect eCommerce web server-Pt1
14-High-level process of selecting controls to protect eCommerce web server-Pt2
15-Steps involved in assessing the identified cyber risks in web server
16-Identify assets, identify threats, identify vulnerabilities
17-Determine likelihood, Impact, Calculate risk
18-Documenting Cybersecurity Risk Assessment Report-Pt 2
18-Documenting Cybersecurity Risk Assessment Report-Pt 1
19-The role of governance in the effective selection and implementation of cybersecurity controls
20-Why not implement frameworks that already have recommended controls
21-Challenges, considerations & disadvantages associated with implementing frameworks-Pt 1
21-Challenges, considerations & disadvantages associated with implementing frameworks-Pt 2
22-When to, versus when not to use frameworks for the selection and implementation of controls
23-Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF) Pt1
23-Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF) Pt2
24-Implementation Plan for identified controls
25- Measuring the effectiveness of implemented controls
26-Putting it all together-The Selection and Implementation of Cybersecurity Risks Controls
27-Course Recap-END
ASSIGNMENT-Research
-
1IntroductionVideo lesson
-
21b-Course Intro- The Case at handVideo lesson
-
32-About the courseVideo lesson
-
43-Meet your Instructor-MentorVideo lesson
-
54-Course RoadmapVideo lesson
-
65-Approach to Control Selection_ pt1Video lesson
-
76-Approach to Control Selection_ pt2Video lesson
-
87-Applying same approach to real Data Breaches at a high-levelVideo lesson
-
98-Introduction to security controlsVideo lesson
-
109-Key considerations for the identification- selection & implementation of contrVideo lesson
-
1110-Risk Assessment-BIA, Control Selection, Cost Benefit AnalysisVideo lesson
-
1211-Cost Benefit Analysis associated with controls selectionVideo lesson
-
1312- Technology integration, operational impact, continuous monitoring, employeeVideo lesson
-
1413-Regulatory Compliance, Incident Response PlanningVideo lesson
-
1514-High-level process of selecting controls to protect ecommerce web server-Pt1Video lesson
-
1614-High-level process of selecting controls to protect ecommerce web server-Pt2Video lesson
-
1715-Steps involved in assessing the identified cyber risks in web serverVideo lesson
-
1816-Identify assets, identify threats, identify vulnerabilitiesVideo lesson
-
1917-Determine likelihood, Impact, Calculate riskVideo lesson
-
2018- Documenting Cybersecurity Risk Assessment Report-Pt1Video lesson
-
2118-Documenting Cybersecurity Risk Assessment Report-Pt2Video lesson
-
2219- The role of governance in the effective selection and implementation of cybeVideo lesson
-
2320-Why not implement frameworks that already have recommended controlsVideo lesson
-
2421-Challenges, & considerations associated with implementing frameworks-pt1Video lesson
-
2521-Challenges, & considerations associated with implementing frameworks-pt2Video lesson
-
2622-When to use frameworks for the selection and implementation of controlsVideo lesson
-
2723-Selecting and implementing cybersecurity controls based on NIST CSF PT1Video lesson
-
2823-Selecting and implementing cybersecurity controls based on NIST CSF PT2Video lesson
-
2924-Implementation Plan for selected controlsVideo lesson
-
3025- Measuring the effectiveness of implemented controlsVideo lesson
-
31Putting it all together-The Selection and Implementation of Cyber Risks controlsVideo lesson
-
3227-Course Recap-ENDVideo lesson
External Links May Contain Affiliate Links read more