Prerequisite: CMP 620. Apply critical thinking and analysis to determine potential risks to the enterprise. Investigate the application of systems, tools, and concepts to minimize risk in an organization's cyberspace initiatives. Explore how to identify threats, conduct vulnerability assessments, and perform risk assessment and management. Examine system development and application assurance from a holistic viewpoint that spans the cyberspace landscapes. Gain an understanding of the value provided by regulatory, policy, and compliance guidelines in addition to pure technology options.
Learning Objectives
After completing this course, you should be able to:
- Employ cybersecurity terminology and applied technologies in order to assess cyber management and policy needs and collaborate with stakeholders
- Apply human aspect principles to cybersecurity management and policy and design a cybersecurity strategy that aligns with the vision, mission, and goals of the organization's operational and strategic plans
- Integrate appropriate enterprise, national, and international regulatory and compliance aspects into the cybersecurity governance framework and align an organization's security posture to applicable laws, statutes, and regulatory documents
- Describe current developments in cybersecurity technologies and policies and address cyberattacks and incidents at the enterprise, national, and international levels
- Apply the systems, tools, and concepts used to minimize risks to an organization's cyberspace and prevent cybersecurity incidents
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cybersecurity Management
- Executive Cyber Leadership
- Incident Response
- Legal Advice and Advocacy
- Program/Project Management and Acquisition
- Risk Management
- Strategic Planning and Policy
- Systems Architecture
- Systems Requirements Planning
- Threat Analysis
- Training, Education, and Awareness
- Vulnerability Assessment and Management
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.