Digital Transformation
• Explain what it means to “become digital”
• Discuss the difference between industrial and digital era
enterprises
• Explain how cybersecurity supports an organization's
digital
Transformation
Understanding Cyber Risks
• Explain the cyber risk equation
• Identify and explain each component of the cyber risk
equation
• Describe the basics of a risk assessment
NIST Cybersecurity Framework Fundamentals • Explain the
genesis of the NIST-CSF
• List and describe the components of the NIST-CSF
• Describe each of the NIST-CSF's objectives
Core Functions, Categories and Subcategories
• Understand and explain
– Core functions
– Framework categories
– Informative references
Implementation Tiers and Profiles
• Understand and explain Implementation Tier terms and
their use
• Understand and explain each Implementation Tier
• Understand and describe the three risk categories
• Understand and explain Profiles and their use
• Understand and describe the use of Profiles when
– Determining gaps
– Identifying and prioritizing focus areas
Cybersecurity Improvement
• Understand and explain how an organization can
approach the adoption and adaptation of the NIST-CSF
• Understand and describe how to implement cybersecurity
controls using an incremental improvement approach
• Understand and describe CIIS as a practice within an
organization
TARGET AUDIENCE:
• Candidates looking to pursue a career in
cybersecurity
• IT, cybersecurity and digital transformation
design and implementation engineers
• IT, cybersecurity and digital transformation
technical operations and business analysts
• IT, cybersecurity and digital transformation specialists
including pen testers, ethical
hackers, software and application developers,
auditors, and investigators
COURSE PREREQUISITES:
Working knowledge of IT
COURSE CONTENT:
H0DV7S (hpe.com)
COURSE OBJECTIVE:
At the conclusion of this course, the student will be able
to:
• Use the Framework as a key part of a
systematic process for identifying, assessing,
and managing cybersecurity risk
• Overlay the Framework onto current
processes to determine gaps in current
cybersecurity risk approach and develop a
roadmap
• Use the Framework as a cybersecurity risk
management tool
• Determine activities that are most important
to critical service delivery and prioritize
expenditures to maximize the impact of the
investment.
FOLLOW ON COURSES:
Not available. Please contact.