Nist Cybersecurity Framework 2.0 Foundation
Published 1/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.30 GB | Duration: 2h 12m
Published 1/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.30 GB | Duration: 2h 12m
Learn how to use the all-new NIST CSF 2.0 to protect your organization.
What you'll learn
Understand the components of the NIST Cybersecurity Framework.
How to use the six functions of the CSF Core: Govern, Identify, Protect, Detect, Respond and Recover.
How to develop organizational profiles.
How to use Tiers to mature a cybersecurity program over time.
Requirements
General IT knowledge is recommended but not required.
Description
The NIST Cybersecurity Framework (CSF) is a widely recognized tool designed to help organizations of all sizes and industries manage and mitigate cybersecurity risks. This course offers a detailed exploration of the newly updated CSF 2.0, equipping you with the knowledge and skills to effectively implement this framework within your organization.We’ll start by breaking down the Core of the CSF, covering its six key functions—Govern, Identify, Protect, Detect, Respond, and Recover—and explore how these functions guide the development of a robust cybersecurity program. Next, we’ll dive into CSF Profiles, demonstrating how they can be tailored to align cybersecurity priorities with organizational goals and unique risk landscapes. Finally, we’ll examine the Implementation Tiers, which help organizations evaluate their current cybersecurity maturity and set clear, actionable goals for improvement.This course is designed to be practical and actionable. You’ll learn how to assess your cybersecurity posture, develop custom profiles, and utilize tiers to guide decision-making and resource allocation. Whether you’re a security professional, risk manager, or business leader, this course will empower you to leverage the NIST CSF 2.0 to enhance resilience, align with industry standards, and effectively communicate cybersecurity initiatives across your organization.Start building your cybersecurity expertise today!
Overview
Section 1: Introduction
Lecture 1 Welcome to the course
Section 2: Cybersecurity Fundamentals
Lecture 2 What is Cybersecurity?
Lecture 3 CIA Triad
Lecture 4 Nonrepudiation and Authenticity
Lecture 5 Risk Fundamentals
Lecture 6 Cybersecurity Risk Management
Section 3: NIST Cybersecurity Framework 2.0
Lecture 7 Cybersecurity Framework (CSF) Overview
Lecture 8 CSF 2.0 Resource Center
Section 4: CSF Core
Lecture 9 CSF Core Overview
Lecture 10 GOVERN (GV) Function
Lecture 11 IDENTIFY (ID) Function
Lecture 12 PROTECT (PR) Function
Lecture 13 DETECT (DE) Function
Lecture 14 RESPOND (RS) Function
Lecture 15 RECOVER (RC) Function
Section 5: CSF Profiles
Lecture 16 Organizational Profiles Overview
Lecture 17 Step 1: Scope the Organizational Profile
Lecture 18 Step 2: Gather needed Information
Lecture 19 Step 3: Create the Organizational Profile
Lecture 20 Step 4: Analyze Gaps and create an Action Plan
Section 6: CSF Tiers
Lecture 21 Using the CSF Tiers
Lecture 22 Tier 1: Partial
Lecture 23 Tier 2: Risk informed
Lecture 24 Tier 3: Repeatable
Lecture 25 Tier 4: Adaptive
Cybersecurity Professionals,CISOs,IT Professionals,Students and recent graduates interested in cybersecurity and risk management.