Prerequisite: CST 640, DFC 640, or CMP 640. Assume the role of a cybersecurity professional by examining current issues in cybersecurity management, including enterprise risk management, vulnerability assessment, threat analysis, crisis management, security architecture, security models, security policy development and implementation, security compliance, information privacy, identity management, incident response, disaster recovery, and business continuity planning, particularly in the health, banking, and finance sectors.
Learning Objectives
After completing this course, students should be able to:
Communication: You can communicate clearly in writing and speaking, meeting expectations for content, purpose, organization, audience, and format.
Critical Thinking and Analysis: You can apply logical processes to formulate clear, defensible ideas based on the analysis of facts and ethical considerations.
Quantitative Reasoning: You can use mathematical information, operations, and quantitative analyses to solve problems and inform decision-making.
Leadership, Facilitation, and Collaboration: You can lead, facilitate, and collaborate with individuals and teams to achieve organizational objectives.
You can employ cybersecurity terminology and applied technologies in order to assess cyber management and policy needs and collaborate with stakeholders.
You can apply human aspect principles to cybersecurity management and policy and design a cybersecurity strategy that aligns with the vision, mission, and goals of the organization's operational and strategic plans.
You can integrate appropriate enterprise, national, and international regulatory and compliance aspects into the cybersecurity governance framework and align an organization's security posture to applicable laws, statutes, and regulatory documents.
You can obtain the knowledge, skills, and abilities needed to master function of cybersecurity technology, including tools and systems.
You can learn the standards, procedures, algorithms, and applications used to protect the confidentiality, integrity and availability of information and information systems.
You can obtain the knowledge of the systems, tools, and concepts used to minimize risks to an organization's cyberspace and prevent a cybersecurity incident.
You can obtain and articulate the knowledge, skills, and abilities needed to detect, identify, respond to, and remediate a host or network security incident as well as to restore functionality to the system or infrastructure.
You can controls access to sensitive electronic information so only those with a legitimate need to access it are allowed to do so.
You can interpret and utilize laws, policies, procedures, and governance in digital forensic and incident response situations.
You can apply proper professional, legal, and ethical frameworks to govern forensic activities in local, national, and global environments.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.