Digital Transformation • Explain what it means to “become digital”• Discuss the difference between industrial and digital era enterprises• Explain how cybersecurity supports an organization'sdigital Transformation Understanding Cyber Risks • Explain the cyber risk equation• Identify and explain each component of the cyber risk equation• Describe the basics of a risk assessmentNIST Cybersecurity Framework Fundamentals • Explain thegenesis of the NIST-CSF• List and describe the components of the NIST-CSF• Describe each of the NIST-CSF's objectives Core Functions, Categories and Subcategories• Understand and explain– Core functions– Framework categories– Informative references Implementation Tiers and Profiles • Understand and explain Implementation Tier terms and their use• Understand and explain each Implementation Tier• Understand and describe the three risk categories• Understand and explain Profiles and their use• Understand and describe the use of Profiles when– Determining gaps– Identifying and prioritizing focus areas Cybersecurity Improvement • Understand and explain how an organization canapproach the adoption and adaptation of the NIST-CSF• Understand and describe how to implement cybersecurity controls using an incremental improvement approach• Understand and describe CIIS as a practice within an organization
COURSE OBJECTIVE:
At the conclusion of this course, the student will be ableto:• Use the Framework as a key part of asystematic process for identifying, assessing,and managing cybersecurity risk• Overlay the Framework onto currentprocesses to determine gaps in currentcybersecurity risk approach and develop aroadmap• Use the Framework as a cybersecurity riskmanagement tool• Determine activities that are most importantto critical service delivery and prioritizeexpenditures to maximize the impact of theinvestment.
TARGET AUDIENCE:
• Candidates looking to pursue a career incybersecurity• IT, cybersecurity and digital transformationdesign and implementation engineers• IT, cybersecurity and digital transformationtechnical operations and business analysts• IT, cybersecurity and digital transformation specialistsincluding pen testers, ethicalhackers, software and application developers,auditors, and investigators
COURSE PREREQUISITES:
Working knowledge of IT
COURSE CONTENT:
H0DV7S (hpe.com)
FOLLOW ON COURSES:
Not available. Please contact.