• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

NIST Cyber Security Professional (NCSP) Foundation

NIST Cyber Security Professional (NCSP) Foundation

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online

  • Full day

  • All levels

Description

Duration

1 Days

6 CPD hours

Overview

The purpose of this document is to provide the learning outcomes for the course and the assessment criteria. It also provides an overview of the examination design in terms of the types of questions asked.Starting with Chapter 2, Digital Transformation, the BL 1 & 2 (for Bloom's Taxonomy 1 & 2) provides the number of questions that will appear on the exam.

This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain.

Digital Transformation

  • Explain what it means to ?become digital.?

  • Discuss the difference between industrial and digital era enterprises.

  • Explain how cybersecurity supports an organization?s digital transformation.

Understanding cyber Risks

  • Explain the cyber risk equation.

  • Identify and explain each component of the cyber risk equation.

  • Describe the basics of a risk assessment.

NIST Cybersecurity Framework Fundamentals9

  • Explain the genesis of the NIST-CSF.

  • List and describe the components of the NIST-CSF.

  • Describe each of the NIST-CSF?s objectives.

Core Functions, Categories & Subcategories

  • Understand and explain the

  • a.Core Functions

  • b.Framework Categories

  • c.Informative References.

Implementation Tiers & Profiles

  • Understand and explain Implementation Tier terms and their use.

  • Understand and explain each Implementation Tier.

  • Understand and describe the three risk categories

  • Understand and explain Profiles and their use

  • a.Current

  • b.Target

  • Understand and describe the use of Profiles when

  • a.Determining gaps

  • b.Identify & prioritize focus areas

Cybersecurity Improvement

  • Understand and explain how an organization can approach the adoption and adaptation of the NIST-CSF

  • Understand and describe how to implement cybersecurity controls using an incremental improvement approach.

  • Understand and describe CIIS as a practice within an organization.

About The Provider

Nexus Human, established over 20 years ago, stands as a pillar of excellence in the realm of IT and Business Skills Training and education in Ireland and the UK....

Read more about Nexus Human

Tags

Reviews