The one-day LRS NIST Cybersecurity Foundation course is designed for anyone in an organization who needs to understand the basics of cybersecurity, the components of the NIST CSF, and how the NIST CSF aligns to risk management. Security, IT, risk management, policy makers, and other business professionals who have responsibility for aspects of business or technical security can benefit from this course.
Instructor did a great job, from experience this subject can be a bit dry to teach but he was able to keep it very engaging and made it much easier to focus.
Excellent presentation skills, subject matter knowledge, and command of the environment.
Instructor was outstanding. Knowledgeable, presented well, and class timing was perfect.
Click here to print this page »
There are no prerequisites for this course. Basic computing skills and security knowledge will be helpful.
Detailed Class Syllabus
Module 1: Course Introduction
Provides the student with information relative to the course and the conduct of the course in the classroom, virtual classroom, and course materials.
Module 2: The Basics of Cybersecurity
What is cybersecurity?
Types of attackers
Module 3: A Holistic Study of the NIST Cybersecurity Framework
i. EO 13636
ii. Cybersecurity Enhancement Act of 2014
iii. EO 13800
Uses and Benefits of the Framework
Attributes of the Framework
Framework Component Introduction
i. Framework Core
ii. Framework Profiles
iii. Framework Implementation Tiers
Module 4: Cybersecurity Activities: The Framework Core
Purpose of the Core
Core Functions, Categories, and Subcategories
Module 5: Risk Management Considerations: Framework Implementation Tiers
Purpose of the Tiers
The Four Tiers
Components of the Tiers
Compare and contrast the NIST Cybersecurity Framework with the NIST Risk Management Framework
Module 6: Current and Desired Outcomes: Framework Profiles
Purpose of the Profiles
The Two Profiles
Interrelationships between the Framework Components
Module 7: A Primer on the Seven Step Framework Implementation Process
Prioritize and Scope
Create a Current Profile
Conduct a Risk Assessment
Create a Target Profile
Determine, Analyze, and Prioritize Gaps
Implement Action Plan