Back

NCSP Boot Camp Certification (HPE_H0DV9S)


Digital Transformation

• Explain what it means to “become digital”

• Discuss the difference between industrial and digital era

enterprises

• Explain how cybersecurity supports an organization's
digital

Transformation

Understanding Cyber Risks

• Explain the cyber risk equation

• Identify and explain each component of the cyber risk

equation

• Describe the basics of a risk assessment

NIST Cybersecurity Framework Fundamentals

• Explain the genesis of the NIST-CSF

• List and describe the components of the NIST-CSF

• Describe each of the NIST-CSF's objectives

Core Functions, Categories and Subcategories • Understand
and explain

– Core functions

– Framework categories

– Informative references

Implementation Tiers and Profiles

• Understand and explain Implementation Tier terms and

their use

• Understand and explain each Implementation Tier

• Understand and describe the three risk categories

• Understand and explain Profiles and their use

• Understand and describe the use of Profiles when

– Determining gaps

– Identifying and prioritizing focus areas

Cybersecurity Improvement

• Understand and explain how an organization can

approach the adoption and adaptation of the NIST-CSF

• Understand and describe how to implement cybersecurity

controls using an incremental improvement approach

• Understand and describe CIIS as a practice within an

Organization

Chapter 1: Course Introduction

• Course organization

• Setting the stage

Chapter 2: Digital Transformation

• DX as a practitioner

• DX in the context of cybersecurity

• Cybersecurity as a DX catalyst

Chapter 3: Threat Landscape

• Threat actors: Agile and Creative

• Attacks

• Challenges

• Organizational response to threat landscape

• Absolute prevention not possible

Chapter 4: The Controls

• Initiation and basic

• Foundation

• Organizational and recovery

Chapter 5: Adopt and Adapt

• The context of adopt and adapt

• Cybersecurity and culture

• Where we are

Chapter 6: Adaptive Way of Working

• Introduction to adaptive way to work

• How to get started

Chapter 7: Rapid Adoption and Rapid Adaptation FastTrack™

• Rapid adoption

• Rapid adaptation

Chapter 8: CIIS as a Practice

• Ongoing practice of cybersecurity

• NIST 7-step improvement

• Cybersecurity Maturity Model Certification (CMMC)

• Integrate cybersecurity

TARGET AUDIENCE:
• Candidates looking to pursue a career in
cybersecurity • IT, cybersecurity and digital transformation
design and implementation engineers • IT, cybersecurity and digital transformation
technical operations and business analysts • IT, cybersecurity and digital transformation
specialists including pen testers, ethical
hackers, software and application developers,
auditors, and investigators

COURSE PREREQUISITES:
Candidates must have a reasonable amount of
cyber security awareness and/or experience.

COURSE CONTENT:
H0DV9S (hpe.com)

COURSE OBJECTIVE:
Upon completion of this course, students
will have:• The skills and abilities to design, build,
test, manage and improve a cybersecurity
program based on the NCSF • The knowledge to prepare for the
NSCP Boot Camp exam (Foundation +
Practitioner)

FOLLOW ON COURSES:
Not available. Please contact.