Selection and Implementation of Cybersecurity Risks Controls

Selection and Implementation of Cybersecurity Risks Controls

This course was developed as a means of helping entry-level as well as seasoned cybersecurity professionals, to develop a more holistic rather than isolated approach to implementing controls to address cyber or information security risks. The content of this course is as follows:

What you’ll learn

  • Student will learn how to holistically apply a 360 degree approach to the selection and implementation of security risks control measures.
  • Key considerations for the identification, selection & implementation of security controls.
  • High-level process of selecting controls to protect\ address idenitfied security risks on ecommerce web server.
  • The role of governance in the effective selection and implementation of cybersecurity controls.
  • Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF).

Course Content

  • Introduction –> 14 lectures • 1hr 3min.
  • SECTION-2 –> 18 lectures • 2hr 3min.
  • Assignment- To reinforce knowledge gained –> 0 lectures • 0min.
  • Course Resources –> 1 lecture • 1min.

Auto Draft

Requirements

This course was developed as a means of helping entry-level as well as seasoned cybersecurity professionals, to develop a more holistic rather than isolated approach to implementing controls to address cyber or information security risks. The content of this course is as follows:

SECTION 1 TOPICS

1a-Course Intro

1b-Course Intro- The Case at hand

2-About the course

3-Meet your Instructor-Mentor

4-Course Roadmap

5-Approach to Control Selection_ pt1

6-Approach to Control Selection_ pt2

7-Applying same approach to real Data Breaches at a high-level

8-Introduction to security controls

9-Key considerations for the identification- selection & implementation of controls

10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis

11-Cost Benefit Analysis associated with controls selection

12-Technology integration, Operational impact, continuous monitoring, Employee training

13-Regulatory Compliance, Incident Response Planning

SECTION 2 TOPICS

14-High-level process of selecting controls to protect eCommerce web server-Pt1

14-High-level process of selecting controls to protect eCommerce web server-Pt2

15-Steps involved in assessing the identified cyber risks in web server

16-Identify assets, identify threats, identify vulnerabilities

17-Determine likelihood, Impact, Calculate risk

18-Documenting Cybersecurity Risk Assessment Report-Pt 2

18-Documenting Cybersecurity Risk Assessment Report-Pt 1

19-The role of governance in the effective selection and implementation of cybersecurity controls

20-Why not implement frameworks that already have recommended controls

21-Challenges, considerations & disadvantages associated with implementing frameworks-Pt 1

21-Challenges, considerations & disadvantages associated with implementing frameworks-Pt 2

22-When to,  versus when not to use frameworks for the selection and implementation of controls

23-Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF) Pt1

23-Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF) Pt2

24-Implementation Plan for identified controls

25- Measuring the effectiveness of implemented controls

26-Putting it all together-The Selection and Implementation of Cybersecurity Risks Controls

27-Course Recap-END

ASSIGNMENT-Research