https://i122.fastpic.org/big/2023/1109/a5/e86da51e3b589c86a9700a8785d0eca5.jpeg

Practical Nist Risk Management Framework Implementation
Published 11/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.77 GB | Duration: 7h 43m

With Use Case and Assignments

What you'll learn
Master all 47 NIST RMF tasks through hands-on application.
Apply RMF processes to different organizational scenarios.
Analyze and improve cybersecurity risk management in real contexts.
Develop actionable security and privacy strategies for live systems.
Requirements
No prerequisites
Description
The course "Practical NIST Risk Management Framework Implementation" is an in-depth exploration tailored for those who aspire to deeply understand and apply the principles of cybersecurity risk management in the workplace. It unpacks the NIST RMF through a methodical study of its 47 tasks, coupled with actionable insights and applications.Participants will begin with a detailed review of the RMF tasks using a model company scenario, which serves as a concrete example for discussion and analysis. This case study method provides a clear context for each task, emphasizing the application over mere theory.The course is structured to reinforce learning through practice. After studying the model company, learners will take on assignments that apply the RMF tasks to different organizational settings. This dual-application approach ensures that the knowledge gained is adaptable and practical, preparing learners to implement these skills in their own or various professional environments.Professionals who will find the course most beneficial include IT staff, cybersecurity professionals, system administrators, and compliance officers who are looking to expand their knowledge base or seeking to apply the RMF in their daily work. The course is suitable for those aiming to enhance their careers in cybersecurity, refine their organization's risk management practices, or develop a proactive approach to emerging security challenges.By the end of this course, learners will not just have a certificate to show for their efforts but will have acquired a skill set that can be directly applied to improve cybersecurity measures within their organizations. This course promises a transformation from a theoretical understanding of the RMF to practical, real-world application, making it a critical investment for anyone serious about cybersecurity risk management.
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 Why This Course?
Lecture 3 About NIST Risk Management Framework
Lecture 4 NIST 800-53 Structure
Lecture 5 The Model Company - CyberSec Solutions
Section 2: The Fundamentals
Lecture 6 The Fundamentals
Lecture 7 Organization Wide Risk Management
Lecture 8 Information Security and Privacy in the RMF
Lecture 9 NIST RMF Steps
Lecture 10 System and System Elements
Lecture 11 Authorization Boundaries
Lecture 12 Requirements and Controls
Lecture 13 Security and Privacy Posture
Lecture 14 Supply Chain Risk Management
Section 3: 1. Prepare
Lecture 15 PREPARE TASKS - ORGANIZATION and SYSTEM LEVEL
Lecture 16 Task P-1 - RISK MANAGEMENT ROLES
Lecture 17 Task P-1: CyberSec Risk Management Roles
Lecture 18 Task P-2 - RISK MANAGEMENT STRATEGY
Lecture 19 Task P-2: CyberSec Risk Management Strategy
Lecture 20 Task P-3: RISK ASSESSMENT - ORGANIZATION
Lecture 21 Task P-3 CyberSec Risk Assessment
Lecture 22 Task P-4: ORGANIZATIONALLY-TAILORED CONTROL BASELINES
Lecture 23 Task P-4 CyberSec Control Baselines
Lecture 24 Task P-5: COMMON CONTROL IDENTIFICATION
Lecture 25 Task P-5 CyberSec Common Control Identification
Lecture 26 Task P-6: IMPACT-LEVEL PRIORITIZATION
Lecture 27 Task P-6 CyberSec Impact Level Prioritization
Lecture 28 Task P-7: CONTINUOUS MONITORING STRATEGY-ORGANIZATION
Lecture 29 Task P-7 CyberSec Continuous Monitoring Strategy
Lecture 30 Task P-8: MISSION OR BUSINESS FOCUS
Lecture 31 Task P-8: CyberSec Mission or Business Focus
Lecture 32 Task P-9: SYSTEM STAKEHOLDERS
Lecture 33 Task P-9: CyberSec System Stakeholders
Lecture 34 Task P-10: ASSET IDENTIFICATION
Lecture 35 Task P-9: CyberSec Asset Identification
Lecture 36 Task P-10: ASSET IDENTIFICATION
Lecture 37 Task P-10: CyberSec Asset Identification
Lecture 38 Task P-11: AUTHORIZATION BOUNDARY
Lecture 39 Task P-11: CyberSec Authorization Boundary
Lecture 40 Task P-12: INFORMATION TYPES
Lecture 41 Task P-12: CyberSec Information Types
Lecture 42 Task P-13: INFORMATION LIFE CYCLE
Lecture 43 Task P-13: CyberSec Information Life Cycle
Lecture 44 Task P-14: RISK ASSESSMENT-SYSTEM
Lecture 45 Task P-14: CyberSec System Risk Assessment
Lecture 46 Task P-15 - REQUIREMENTS DEFINITION
Lecture 47 Task P-15: CyberSec Requirement Definition
Lecture 48 Task P-16 - ENTERPRISE ARCHITECTURE
Lecture 49 Task P-16: CyberSec Enterprise Architecture
Lecture 50 Task P-17: REQUIREMENTS ALLOCATION
Lecture 51 Task P-17: CyberSec Requirement Definition
Lecture 52 Task P-18: SYSTEM REGISTRATION
Lecture 53 Task P-18: CyberSec System Registration
Section 4: 2. Categorize
Lecture 54 CATEGORIZE
Lecture 55 TASK C-1 - SYSTEM DESCRIPTION
Lecture 56 Task C-1: CyberSec System Description
Lecture 57 Task C-2: SECURITY CATEGORIZATION
Lecture 58 Task C-2: CyberSec Security Categorization
Lecture 59 Task C-3: SECURITY CATEGORIZATION REVIEW AND APPROVAL
Lecture 60 Task C-3: CyberSec CRM Categorization Review and Approval
Section 5: 3. Select
Lecture 61 Step 3 -SELECT
Lecture 62 Task S-1 - CONTROL SELECTION
Lecture 63 Task S-1: CyberSec Control Selection
Lecture 64 Task S-2: CONTROL TAILORING
Lecture 65 Task S-2: CyberSec Control Tailoring
Lecture 66 Task S-3: CONTROL ALLOCATION
Lecture 67 Task S-3: CyberSec Control Allocation
Lecture 68 Task S-4 DOCUMENTATION OF PLANNED CONTROL IMPLEMENTATIONS
Lecture 69 Task S-4: CyberSec Documentation of Control Implementation
Lecture 70 Task S-5: CONTINUOUS MONITORING STRATEGY-SYSTEM
Lecture 71 Task S-5: CyberSec Continuous Monitoring Strategy
Lecture 72 Task S-6: PLAN REVIEW AND APPROVAL
Section 6: 4. Implement
Lecture 73 Step 4: Implement
Lecture 74 Task I-1: CONTROL IMPLEMENTATION
Lecture 75 Task I-1: CyberSec Control Implementation
Lecture 76 Task I-2: UPDATE CONTROL IMPLEMENTATION INFORMATION
Lecture 77 Task I-2: Update CyberSec CRM Implementation Information
Section 7: 5. Assess
Lecture 78 Step 5 -Assess
Lecture 79 Task A-1: ASSESSOR SELECTION
Lecture 80 Task A-1: Assessor Selection at CyberSec
Lecture 81 Task A-2: ASSESSMENT PLAN
Lecture 82 TASK A-2: CyberSec Assessment Plan
Lecture 83 Task A-3: CONTROL ASSESSMENTS
Lecture 84 Task A-3 CyberSec Control Assessments
Lecture 85 Task A-4: ASSESSMENT REPORTS
Lecture 86 Task A-4: CyberSec Assessment Reports
Lecture 87 Task A-5: REMEDIATION ACTIONS
Lecture 88 Task A-5: CyberSec Remediations Actions
Lecture 89 Task A-6: PLAN OF ACTION AND MILESTONES
Lecture 90 Task A-6: CyberSec Plan of Actions and Milestones
Section 8: 6. Authorize
Lecture 91 Step 6: Authorize
Lecture 92 Task R-1: AUTHORIZATION PACKAGE
Lecture 93 Task R-1: CyberSec Authorization Package
Lecture 94 TASK R-2: RISK ANALYSIS AND DETERMINATION
Lecture 95 Task R-2: CyberSec Risk Analysis and Determination
Lecture 96 Task R-3: RISK RESPONSE
Lecture 97 Task R-3: CyberSec Risk Response
Lecture 98 Task R-4: AUTHORIZATION DECISION
Lecture 99 Task R-4: CyberSec Authorization Decision
Lecture 100 Task R-5: AUTHORIZATION REPORTING
Lecture 101 Task R-5: CyberSec Authorization Reporting
Section 9: 7. Monitor
Lecture 102 Step 7: Monitor
Lecture 103 Task M-1: SYSTEM AND ENVIRONMENT CHANGES
Lecture 104 Task M-1: System and Environment Change for CyberSec
Lecture 105 Task M-2: ONGOING ASSESSMENTS
Lecture 106 Task M-2: CyberSec Ongoing Assessments
Lecture 107 TASK M-3: ONGOING RISK RESPONSE
Lecture 108 Task M-3: Ongoing Risk Response in CyberSec
Lecture 109 Task M-4: AUTHORIZATION PACKAGE UPDATES
Lecture 110 Task M-4: Authorization Package Updates for CyberSec
Lecture 111 TASK M-5: SECURITY AND PRIVACY REPORTING
Lecture 112 Task M-5 - CyberSec Security and Privacy Reporting
Lecture 113 Task M-6: ONGOING AUTHORIZATION
Lecture 114 Task M-6: Ongoing Authorization at CyberSec
Lecture 115 Task M-7: SYSTEM DISPOSAL
Lecture 116 Task M-7: CyberSec System Disposal
Section 10: Conclusion
Lecture 117 Conclusion
Cybersecurity Analysts: Those seeking to comprehend and implement RMF tasks to bolster organizational security.,Risk Management Consultants: Professionals aspiring to provide comprehensive RMF-based guidance to clients across industries.,IT Managers and CISOs: Leaders responsible for overseeing and improving their organization's security posture.,System Administrators: Technical staff who implement and manage security measures within IT systems.,Compliance Officers: Individuals ensuring that organizations meet federal cybersecurity requirements and standards.,Privacy Officers: Professionals focused on integrating privacy into risk management frameworks.,Security Architects: Designers of systems who need to embed RMF principles into the architecture from the ground up.,Students of Information Security: Those currently studying and looking to augment their knowledge with practical, real-world applications of RMF.,Federal Employees: Government workers who must adhere to RMF in their operational duties.,Project Managers: Individuals leading projects that include RMF as a component of their cybersecurity strategy.

Screenshots

https://i122.fastpic.org/big/2023/1109/27/1b60623b23fda4de66910a494de18b27.jpeg

Download link

rapidgator.net:

Код:
https://rapidgator.net/file/6e876ecaf86095b35a6d10ff0a522cf4/otdeg.Practical.Nist.Risk.Management.Framework.Implementation.part1.rar.html
https://rapidgator.net/file/d668b3c289fd4070c453834647c4fafc/otdeg.Practical.Nist.Risk.Management.Framework.Implementation.part2.rar.html
https://rapidgator.net/file/d7235aec84bc217f796f7a73f71fd4f0/otdeg.Practical.Nist.Risk.Management.Framework.Implementation.part3.rar.html
https://rapidgator.net/file/14e07a885c1585b56f19f7c498c88efd/otdeg.Practical.Nist.Risk.Management.Framework.Implementation.part4.rar.html
https://rapidgator.net/file/a63baa246d48dbeab8db3451ec408a39/otdeg.Practical.Nist.Risk.Management.Framework.Implementation.part5.rar.html

uploadgig.com:

Код:
https://uploadgig.com/file/download/30115124BEf034dD/otdeg.Practical.Nist.Risk.Management.Framework.Implementation.part1.rar
https://uploadgig.com/file/download/851e679258a3e449/otdeg.Practical.Nist.Risk.Management.Framework.Implementation.part2.rar
https://uploadgig.com/file/download/3C57ff5731322453/otdeg.Practical.Nist.Risk.Management.Framework.Implementation.part3.rar
https://uploadgig.com/file/download/F48469e7b418C5ee/otdeg.Practical.Nist.Risk.Management.Framework.Implementation.part4.rar
https://uploadgig.com/file/download/7e97B92c2a48e8de/otdeg.Practical.Nist.Risk.Management.Framework.Implementation.part5.rar

nitroflare.com:

Код:
https://nitroflare.com/view/16153ACDF8ACE76/otdeg.Practical.Nist.Risk.Management.Framework.Implementation.part1.rar
https://nitroflare.com/view/086C2B7559F7AEC/otdeg.Practical.Nist.Risk.Management.Framework.Implementation.part2.rar
https://nitroflare.com/view/79D60B3415E9249/otdeg.Practical.Nist.Risk.Management.Framework.Implementation.part3.rar
https://nitroflare.com/view/983EDA48FE5BF0C/otdeg.Practical.Nist.Risk.Management.Framework.Implementation.part4.rar
https://nitroflare.com/view/37AAEB6038F096E/otdeg.Practical.Nist.Risk.Management.Framework.Implementation.part5.rar