In this quick course we will go over the details of the NIST 2.0 Functions of Identify and Protect. We will touch on how these functions are applied within the NIST 2.0 framework to help secure your organization.
Overview
COURSE INSTRUCTOR
COURSE DIFFICULTY
COURSE DURATION
1h
Skills Learned
After completing this online training course, students will be able to:
Identify Function's Scope
Understand MFA, System Hardening, Patch Management, and Endpoint Security
Understand Risk Assessment, how to maintain a Risk Register, and schedule re-assessments
Students looking to learn more about the recent NIST 2.0 updates and would like to gain practical skills to implement and manage a robust cybersecurity program.
None, but we recommend that you have a background in cybersecurity.
01. The Identify Function
- Identify
- The Identify Function’s Scope
- Identify Function: Risk Assessment
- Identify Function: Maintaining a Risk Register
- Identify Function: Ongoing Monitoring
- Identify Function: Scheduled Re-Assessments
- Identify Function: Continuous Improvement of Cybersecurity Controls
02. The Protect Function
- Protect
- Protect Function: Physical Controls
- Protect Function: Technical Controls
- Protect Function: Data Security Measures
- Protect Function: RBAC
- Protect Function: Multi-Factor Authentication
- Protect Function: System Hardening
- Protect Function: Patch Management
- Protect Function: Endpoint Security
- Protect Function: Technology Infrastructure Resilience: Network Segmentation
- Protect Function: Technology Infrastructure Resilience: Resilience Planning, Failover, and Redundancy
SKILLS LEARNED
Skills Learned
After completing this online training course, students will be able to:
Identify Function's Scope
Understand MFA, System Hardening, Patch Management, and Endpoint Security
Understand Risk Assessment, how to maintain a Risk Register, and schedule re-assessments
WHO SHOULD ATTEND
Students looking to learn more about the recent NIST 2.0 updates and would like to gain practical skills to implement and manage a robust cybersecurity program.
PREREQUISITES
None, but we recommend that you have a background in cybersecurity.
COURSE OUTLINE
01. The Identify Function
- Identify
- The Identify Function’s Scope
- Identify Function: Risk Assessment
- Identify Function: Maintaining a Risk Register
- Identify Function: Ongoing Monitoring
- Identify Function: Scheduled Re-Assessments
- Identify Function: Continuous Improvement of Cybersecurity Controls
02. The Protect Function
- Protect
- Protect Function: Physical Controls
- Protect Function: Technical Controls
- Protect Function: Data Security Measures
- Protect Function: RBAC
- Protect Function: Multi-Factor Authentication
- Protect Function: System Hardening
- Protect Function: Patch Management
- Protect Function: Endpoint Security
- Protect Function: Technology Infrastructure Resilience: Network Segmentation
- Protect Function: Technology Infrastructure Resilience: Resilience Planning, Failover, and Redundancy