Use Developing Cybersecurity Programs and Policies course to learn cybersecurity online. This cybersecurity training course covers all the concepts such as cybersecurity frameworks, governance, risk management, human resources security, physical and environmental security; PCI compliance for merchants, and many more. The course offers the best practices to define governance and policy; ensure its compliance, and collaborate to strengthen the whole organization.

starstarstarstarstar_outline

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

This cybersecurity training course covers all the concepts such as cybersecurity frameworks, governance, risk management, human resources security, physical and environmental security.

1
  • Course Introduction

  • Introduction

2
  • Understanding Cybersecurity Policy and Governance

  • Information Security vs. Cybersecurity Policies
    Looking at Policy Through the Ages
    Cybersecurity Policy
    Cybersecurity Policy Life Cycle
    Summary

3
  • Cybersecurity Policy Organization, Format, and Styles

  • Policy Hierarchy
    Writing Style and Technique
    Policy Format
    Summary

4
  • Cybersecurity Framework

  • Confidentiality, Integrity, and Availability
    NIST's Cybersecurity Framework
    Summary

5
  • Governance and Risk Management

  • Understanding Cybersecurity Policies
    Cybersecurity Risk
    Summary

6
  • Asset Management and Data Loss Prevention

  • Information Assets and Systems
    Information Classification
    Labeling and Handling Standards
    Information Systems Inventory
    Understanding Data Loss Prevention Technologies
    Summary

7
  • Human Resources Security

  • The Employee Life Cycle
    The Importance of Employee Agreements
    The Importance of Security Education and Training
    Summary

8
  • Physical and Environmental Security

  • Understanding the Secure Facility Layered Defense Model
    Protecting Equipment
    Summary

9
  • Communications and Operations Security

  • Standard Operating Procedures
    Operational Change Control
    Malware Protection
    Data Replication
    Secure Messaging
    Activity Monitoring and Log Analysis
    Service Provider Oversight
    Threat Intelligence and Information Sharing
    Summary

10
  • Access Control Management

  • Access Control Fundamentals
    Infrastructure Access Controls
    User Access Controls
    Summary

11
  • Information Systems Acquisition, Development, and Maintenance

  • System Security Requirements
    Secure Code
    Cryptography
    Summary

12
  • Cybersecurity Incident Response

  • Incident Response
    What Happened? Investigation and Evidence Handling
    Data Breach Notification Requirements
    Summary

13
  • Business Continuity Management

  • Emergency Preparedness
    Business Continuity Risk Management
    The Business Continuity Plan
    Plan Testing and Maintenance
    Summary

14
  • Regulatory Compliance for Financial Institutions

  • The Gramm-Leach-Bliley Act
    New York's Department of Financial Services Cybersecurity Regulation (23 NYCRR Part
    500)
    What Is a Regulatory Examination?
    Personal and Corporate Identity Theft
    Summary

15
  • Regulatory Compliance for the Health-Care Sector

  • The HIPAA Security Rule
    The HITECH Act and the Omnibus Rule
    Understanding the HIPAA Compliance Enforcement Process
    Summary

16
  • PCI Compliance for Merchants

  • Protecting Cardholder Data
    PCI Compliance
    Summary

17
  • NIST Cybersecurity Framework

  • Introducing the NIST Cybersecurity Framework Components
    The Framework Core
    Framework Implementation Tiers ("Tiers")
    NIST's Recommended Steps to Establish or Improve a Cybersecurity Program
    NIST's Cybersecurity Framework Reference Tool
    Adopting the NIST Cybersecurity Framework in Real Life
    Summary

Audience

Cybersecurity professionals responsible for developing security policy will benefit from this course.

Language

English

Prerequisites

While there are no prerequisites for this course, please ensure you have the right level of experience to be successful in this training.

Length: 365.0 days ( hours)

Level:

Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.

Loading...