NCSF-FOUNDATION - NIST Cybersecurity Framework (NCSF) Foundation Training

The one-day LRS NIST Cybersecurity Foundation course is designed for anyone in an organization who needs to understand the basics of cybersecurity, the components of the NIST CSF, and how the NIST CSF aligns to risk management. Security, IT, risk management, policy makers, and other business professionals who have responsibility for aspects of business or technical security can benefit from this course.

Student Testimonials

Instructor did a great job, from experience this subject can be a bit dry to teach but he was able to keep it very engaging and made it much easier to focus. Student
Excellent presentation skills, subject matter knowledge, and command of the environment. Student
Instructor was outstanding. Knowledgeable, presented well, and class timing was perfect. Student

Click here to print this page »


There are no prerequisites for this course. Basic computing skills and security knowledge will be helpful.

Detailed Class Syllabus

Module 1: Course Introduction

Provides the student with information relative to the course and the conduct of the course in the classroom, virtual classroom, and course materials.

Module 2: The Basics of Cybersecurity

What is cybersecurity?
Types of attackers
Risk-Based Cybersecurity

Module 3: A Holistic Study of the NIST Cybersecurity Framework

i. EO 13636
ii. Cybersecurity Enhancement Act of 2014
iii. EO 13800
Uses and Benefits of the Framework
Attributes of the Framework
Framework Component Introduction
i. Framework Core
ii. Framework Profiles
iii. Framework Implementation Tiers

Module 4: Cybersecurity Activities: The Framework Core

Purpose of the Core
Core Functions, Categories, and Subcategories
Informative References

Module 5: Risk Management Considerations: Framework Implementation Tiers

Purpose of the Tiers
The Four Tiers
Components of the Tiers
Compare and contrast the NIST Cybersecurity Framework with the NIST Risk Management Framework

Module 6: Current and Desired Outcomes: Framework Profiles

Purpose of the Profiles
The Two Profiles
Interrelationships between the Framework Components

Module 7: A Primer on the Seven Step Framework Implementation Process

Prioritize and Scope
Create a Current Profile
Conduct a Risk Assessment
Create a Target Profile
Determine, Analyze, and Prioritize Gaps
Implement Action Plan