Students are provided the with essential skills in areas such as understanding the cybersecurity landscape, managing cybersecurity risks, responding to incidents, practicing secure software development, complying with legal and regulatory standards, ensuring physical and operational security, and designing secure network infrastructure in preparation for the ISC2 Certified in Cyber Certification. Students will also review and analyze the concepts and interrelationships underlying cybersecurity compliance methodologies, including the NIST Risk Management Framework (RMF), FedRAMP, NIST 800-171, CMMC, NIST Cyber Security Framework (CSF), and NIST 800-53. Students develop competencies to utilize NIST RMF Step 0 (Prepare) and are introduced to Step 1 (Categorize), as well as FedRAMP Steps 1-2.
Learning Objectives
Analyze and interpret patterns of threats, attacks, vulnerabilities, and devise effective countermeasures. Evaluate cybersecurity risks, formulate assessments, and manage them by designing tailored mitigation strategies. Apply knowledge in creating and implementing response strategies for cybersecurity incidents, and devise comprehensive disaster recovery and business continuity plans. Synthesize secure coding practices and integrate them innovatively throughout the software development lifecycle. Critically review and apply cybersecurity laws, regulations, and advocate for privacy and data protection in all cybersecurity activities. Formulate and maintain strategies for the security of physical assets and operational security procedures, considering potential threats and changes in the environment. Define and analyze risk tolerance as it applies to an organization's decision-making process. Analyze CGRC Domain learning contributions to certification preparation.
Apply the NIST RMF to a practical scenario for addressing FISMA compliance. Analyze systems for categorization and align with policy and guidance. Develop a System Security Plan appropriate for a system. Identify the requirements of Personally Identifiable Information (PII) and apply appropriate controls.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.