Back

NCSP Foundation Training (HPE_H0DV7S)


Digital Transformation

• Explain what it means to “become digital”

• Discuss the difference between industrial and digital era

enterprises

• Explain how cybersecurity supports an organization's
digital

Transformation

Understanding Cyber Risks

• Explain the cyber risk equation

• Identify and explain each component of the cyber risk

equation

• Describe the basics of a risk assessment

NIST Cybersecurity Framework Fundamentals • Explain the
genesis of the NIST-CSF

• List and describe the components of the NIST-CSF

• Describe each of the NIST-CSF's objectives

Core Functions, Categories and Subcategories

• Understand and explain

– Core functions

– Framework categories

– Informative references

Implementation Tiers and Profiles

• Understand and explain Implementation Tier terms and

their use

• Understand and explain each Implementation Tier

• Understand and describe the three risk categories

• Understand and explain Profiles and their use

• Understand and describe the use of Profiles when

– Determining gaps

– Identifying and prioritizing focus areas

Cybersecurity Improvement

• Understand and explain how an organization can

approach the adoption and adaptation of the NIST-CSF

• Understand and describe how to implement cybersecurity

controls using an incremental improvement approach

• Understand and describe CIIS as a practice within an

organization

TARGET AUDIENCE:
• Candidates looking to pursue a career in

cybersecurity

• IT, cybersecurity and digital transformation

design and implementation engineers

• IT, cybersecurity and digital transformation

technical operations and business analysts

• IT, cybersecurity and digital transformation specialists
including pen testers, ethical

hackers, software and application developers,

auditors, and investigators

COURSE PREREQUISITES:
Working knowledge of IT

COURSE CONTENT:
H0DV7S (hpe.com)

COURSE OBJECTIVE:
At the conclusion of this course, the student will be able
to:

• Use the Framework as a key part of a

systematic process for identifying, assessing,

and managing cybersecurity risk

• Overlay the Framework onto current

processes to determine gaps in current

cybersecurity risk approach and develop a

roadmap

• Use the Framework as a cybersecurity risk

management tool

• Determine activities that are most important

to critical service delivery and prioritize

expenditures to maximize the impact of the

investment.

FOLLOW ON COURSES:
Not available. Please contact.