Selection and Implementation of Cybersecurity Risks Controls
This course was developed as a means of helping entry-level as well as seasoned cybersecurity professionals, to develop a more holistic rather than isolated approach to implementing controls to address cyber or information security risks. The content of this course is as follows:
What you’ll learn
- Student will learn how to holistically apply a 360 degree approach to the selection and implementation of security risks control measures.
- Key considerations for the identification, selection & implementation of security controls.
- High-level process of selecting controls to protect\ address idenitfied security risks on ecommerce web server.
- The role of governance in the effective selection and implementation of cybersecurity controls.
- Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF).
Course Content
- Introduction –> 14 lectures • 1hr 3min.
- SECTION-2 –> 18 lectures • 2hr 3min.
- Assignment- To reinforce knowledge gained –> 0 lectures • 0min.
- Course Resources –> 1 lecture • 1min.
Requirements
This course was developed as a means of helping entry-level as well as seasoned cybersecurity professionals, to develop a more holistic rather than isolated approach to implementing controls to address cyber or information security risks. The content of this course is as follows:
SECTION 1 TOPICS
1a-Course Intro
1b-Course Intro- The Case at hand
2-About the course
3-Meet your Instructor-Mentor
4-Course Roadmap
5-Approach to Control Selection_ pt1
6-Approach to Control Selection_ pt2
7-Applying same approach to real Data Breaches at a high-level
8-Introduction to security controls
9-Key considerations for the identification- selection & implementation of controls
10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis
11-Cost Benefit Analysis associated with controls selection
12-Technology integration, Operational impact, continuous monitoring, Employee training
13-Regulatory Compliance, Incident Response Planning
SECTION 2 TOPICS
14-High-level process of selecting controls to protect eCommerce web server-Pt1
14-High-level process of selecting controls to protect eCommerce web server-Pt2
15-Steps involved in assessing the identified cyber risks in web server
16-Identify assets, identify threats, identify vulnerabilities
17-Determine likelihood, Impact, Calculate risk
18-Documenting Cybersecurity Risk Assessment Report-Pt 2
18-Documenting Cybersecurity Risk Assessment Report-Pt 1
19-The role of governance in the effective selection and implementation of cybersecurity controls
20-Why not implement frameworks that already have recommended controls
21-Challenges, considerations & disadvantages associated with implementing frameworks-Pt 1
21-Challenges, considerations & disadvantages associated with implementing frameworks-Pt 2
22-When to, versus when not to use frameworks for the selection and implementation of controls
23-Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF) Pt1
23-Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF) Pt2
24-Implementation Plan for identified controls
25- Measuring the effectiveness of implemented controls
26-Putting it all together-The Selection and Implementation of Cybersecurity Risks Controls
27-Course Recap-END
ASSIGNMENT-Research