Chapter 1: Course Introduction
• Course organization
• Setting the stage
Chapter 2: Digital Transformation
• DX as a practitioner
• DX in the context of cybersecurity
• Cybersecurity as a DX catalyst
Chapter 3: Threat Landscape
• Threat actors: Agile and Creative
• Attacks
• Challenges
• Organizational response to threat landscape
• Absolute prevention not possible
Chapter 4: The Controls
• Initiation and basic
• Foundation
• Organizational and recovery
Chapter 5: Adopt and Adapt
• The context of adopt and adapt
• Cybersecurity and culture
• Where we are
Chapter 6: Adaptive Way of Working
• Introduction to adaptive way to work
• How to get started
Chapter 7: Rapid Adoption and Rapid Adaptation FastTrack™
• Rapid adoption
• Rapid adaptation
Chapter 8: CIIS as a Practice
• Ongoing practice of cybersecurity
• NIST 7-step improvement
• Cybersecurity Maturity Model Certification (CMMC)
• Integrate cybersecurity
TARGET AUDIENCE:
• Candidates looking to pursue a career in cybersecurity• IT, cybersecurity and digital transformation design and
implementation engineers • IT, cybersecurity and digital transformation technical
operations and business analysts
• IT, cybersecurity and digital transformation specialists
including pen testers, ethical hackers, software and application developers,
auditors, and investigators
COURSE PREREQUISITES:
Candidates must complete the NCSP Foundation class (H0DV7S) and pass the NCSP
Foundation exam.
COURSE CONTENT:
H0DV8S (hpe.com)
COURSE OBJECTIVE:
At the conclusion of this class, students
will know a practical approach to build and
maintain a comprehensive cybersecurity and
cyber-risk management program.
FOLLOW ON COURSES:
Not available. Please contact.