Udemy - IT Cyber Security NIST Risk Management Framework

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size1.8 GB
  • Uploaded Byfreecoursewb
  • Downloads58
  • Last checkedFeb. 26th '22
  • Date uploadedFeb. 25th '22
  • Seeders 7
  • Leechers4

Infohash : 6233E9605DC589B4074A920952E94B2AF39072FA

IT Cyber Security NIST Risk Management Framework



https://DevCourseWeb.com

Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.83 GB | Duration: 2h 40m

Implementing NIST SP 800-37R2 Risk Management Framework (RMF) and NIST SP 800-53R5 Security and Privacy Controls

What you'll learn
Take a risk-based approach developing such as a Risk Mangment program
Understand the key components of a NIST RMF
Develop required security policies, standards, and guidelines
Understand the key NIST security controls and countermeasures, how and when to apply them, and under which state condition
Understand information risk management and compliance
Apply appropriate risk-management techniques and models including risk scenarios.
Align cyber security and enterprise risk management with NIST RMF
Manage and monitor the status of risk-management strategies and plans
Design and use effective techniques to communicate Cybersecurity risks to stakeholders in a clear manner.
Select and tailor NIST secuirty and privacy controls

Requirements
Basic Cybersecurity Knowledge
Description
If your job requires you to manage cyber security risks in the high-stakes world of enterprise IT, this course is for you. You'll examine risks, threats, opportunities, and vulnerabilities at the strategic and operational levels. This includes Cybersecurity IT value generation for the business, and the IT NIST Risk Management Framework (RMF).

Files:

[ DevCourseWeb.com ] Udemy - IT Cyber Security NIST Risk Management Framework
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1. Introduction
    • 1. What You will learn in this course.mp4 (32.2 MB)
    • 1. What You will learn in this course.srt (4.5 KB)
    • 1.2 IT Cyber Security NIST Risk Management Framework.pdf (2.1 MB)
    • 1.3 My published Book on Amazon Store.html (0.1 KB)
    • 2. Introduction.mp4 (76.6 MB)
    • 2. Introduction.srt (6.5 KB)
    • 3. Integrating Cybersecurity and ERM.mp4 (31.7 MB)
    • 3. Integrating Cybersecurity and ERM.srt (4.0 KB)
    • Exercise Files
      • CIS_Controls_v8_Mapping_to_NIST_SP_800_53_Rev_5_Low_Baseline_06_21_20.xlsx (416.6 KB)
      • Controlled Unclassified Information (CUI) -SSP-Template-final.docx (69.6 KB)
      • Copy of SSP-A13-FedRAMP-Integrated-Inventory-Workbook-Template.xlsx (292.0 KB)
      • IC-Security-Gap-Analysis-9197.xlsx (75.3 KB)
      • NIST_CSF_Risk_template_DL.xlsx (48.7 KB)
      • POAM_example_DL.xlsx (12.0 KB)
      • SSP A13 FedRAMP Integrated Inventory Template.xlsx (292.1 KB)
      • SSP Template.docx (61.5 KB)
      • business-impact-analysis-worksheet.pdf (37.4 KB)
      • business_risk-assessment-table.pdf (106.4 KB)
    • NIST.IR.8286.pdf (2.2 MB)
    • NIST.IR.8286A.pdf (2.7 MB)
    • NIST.SP.800-171r2.pdf (1.3 MB)
    • NIST.SP.800-37r2.pdf (2.2 MB)
    • NIST.SP.800-53Ar5-draft.pdf (5.0 MB)
    • NIST.SP.800-53B.pdf (1.6 MB)
    • NIST.SP.800-53r5.pdf (5.8 MB)
    • nistspecialpublication800-30r1.pdf (807.5 KB)
    • 10. RMF Authorize Information System step 6
      • 1. RMF Authorization.mp4 (34.1 MB)
      • 1. RMF Authorization.srt (4.6 KB)
      11. RMF Monitor Security Controls step 7
      • 1. NIST RMF Monitoring.mp4 (65.1 MB)
      • 1. NIST RMF Monitoring.srt (7.8 KB)
      • 2. Monitoring is an Ongoing Process.mp4 (61.3 MB)
      • 2. Monitoring is an Ongoing Process.srt (9.3 KB)
      12. NIST RMF Knowledge Resources and Best Practices
      • 1. Tips For Streamlining RMF Implementation.mp4 (16.7 MB)
      • 1. Tips For Streamlining RMF Implementation.srt (2.7 KB)
      • 2. NIST RMF Best practices and Knowledge Resources.mp4 (48.6 MB)
      • 2. NIST RMF Best practices and Knowledge Resources.srt (6.6 KB)
      13. CMMI maturity model and NIST RMF
      • 1. NIST CMMI Maturity Model.mp4 (33.9 MB)
      • 1. NIST CMMI Maturity Model.srt (4.3 KB)
      14. Cyber Security Risk Metrics Indicators
      • 1. Cyber Security Risk Metrics and Performance indicators.mp4 (57.7 MB)
      • 1. Cyber Security Risk Metrics and Performance indicators.srt (7.7 KB)
      15. NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs)
      • 1. NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs).mp4 (24.0 MB)
      • 1. NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs).srt (2.5 KB)
      • 1.1 15 NIST RMF Quick Start Guide.docx (25.3 KB)
      16. Conclusions
      • 1. Conclusions.mp4 (37.4 MB)
      • 1. Conclusions.srt (3.6 KB)
      2. The Course case study
      • 1. Target Cloud Inc. Case Study.mp4 (57.7 MB)
      • 1. Target Cloud Inc. Case Study.srt (4.2 KB)
      • 1.1 Target Cloud Inc Case Study.docx (56.0 KB)
      3. IT Cyber Security Risk
      • 1. What is Risk .mp4 (115.2 MB)
      • 1. What is Risk .srt (9.5 KB)
      • 10. Risk Analysis Methods.mp4 (75.8 MB)
      • 10. Risk Analysis Methods.srt (7.6 KB)
      • 2. Assets, threats, and vulnerabilities.mp4 (41.2 MB)
      • 2. Assets, threats, and vulnerabilities.srt (5.4 KB)
      • 2.1 Cobalt Penetration Testing.html (0.1 KB)
      • 3. Organization’s crown jewels.mp4 (64.0 MB)
      • 3. Organization’s crown jewels.srt (7.4 KB)
      • 4. The Risk-Based Security Approach.mp4 (57.5 MB)
      • 4. The Risk-Based Security Approach.srt (6.8 KB)
      • 5. The Need For Risk Assessment.mp4 (63.2 MB)
      • 5. The Need For Risk Assessment.srt (6.2 KB)
      • 6. Conducting an IT Risk Assessment.mp4 (100.9 MB)
      • 6. Conducting an IT Risk Assessment.srt (16.3 KB)
      • 6.1 Conducting an IT Risk Assessment .docx (37.4 KB)
      • 7. Business Impact Analysis (BIA).mp4 (49.1 MB)
      • 7. Business Impact Analysis (BIA).srt (8.5 KB)
      • 8. A Risk Cost-Benefit Analysis.mp4 (20.4 MB)
      • 8. A Risk Cost-Benefit Analysis.srt (3.1 KB)
      • 9. Enterprise Risk Management Strategy.mp4 (94.8 MB)
      • 9. Enterprise Risk Management Strategy.srt (10.3 KB)
      4. NIST 800-37 R2 Risk Management Framework
      • 1. NIST Risk Management Framework for Information Systems and Organization.mp4 (73.7 MB)
      • 1. NIST Risk Management Framework for Information Systems and Organization.srt (9.9 KB)
      5. RMF Preparation Step 1
      • 1. NIST Risk Management Preparation Strategy.mp4 (46.6 MB)
      • 1. NIST Risk Management Preparation Strategy.srt (7.3 KB)
      6. RMF Categorize Information Systems Step 2
      • 1. Define System Categorization, Scope, and Authorization Boundaries.mp4 (65.9 MB)
      • 1. Define System Categorization, Scope, and Authorization Boundaries.srt (8.4 KB)
      7. RMF Select Security Controls Step 3
      • 1. Introduction to NIST Security Controls.mp4 (40.3 MB)
      • 1. Introduction to NIST Security Controls.srt (6.1 KB)
      • 2. High Water Mark Concept and the Security Control Baseline.mp4 (39.9 MB)
      • 2. High Water Mark Concept and the Security Control Baseline.srt (5.7 KB)
      • 3. Selecting NIST Security Controls.mp4 (46.5 MB)
      • 3. Selecting NIST Security Controls.srt (6.8 KB)
      8. RMF Implement NIST Security Controls step 4
      • 1. NIST Security Controls Implementation.mp4 (44.5 MB)
      • 1. NIST Security Controls Implementation.srt (5.3 KB)
      • 2. Tailoring NIST Control Baselines.mp4 (34.3 MB)
      • 2. Tailoring NIST Control Baselines.srt (3.9 KB)
      9. RMF Assess Security Controls step 5
      • 1. Assigning NIST RMF Assessment Objectives.mp4 (41.1 MB)
      • Code:

        • udp://tracker.torrent.eu.org:451/announce
        • udp://tracker.tiny-vps.com:6969/announce
        • http://tracker.foreverpirates.co:80/announce
        • udp://tracker.cyberia.is:6969/announce
        • udp://exodus.desync.com:6969/announce
        • udp://explodie.org:6969/announce
        • udp://tracker.opentrackr.org:1337/announce
        • udp://9.rarbg.to:2780/announce
        • udp://tracker.internetwarriors.net:1337/announce
        • udp://ipv4.tracker.harry.lu:80/announce
        • udp://open.stealth.si:80/announce
        • udp://9.rarbg.to:2900/announce
        • udp://9.rarbg.me:2720/announce
        • udp://opentor.org:2710/announce