Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Chesapeake Cyber Institute
  4. Audit of Security Risk Management Course

Audit of Security Risk Management Course

This a self paced 12 week audit course that covers the fundamentals of risk analysis, risk management, security policy, legal issues, and secure systems development, risk management standards ( NIST 800-30, NIST 800-39), SANS 20 critical security practices, Incident response methodologies with a look through NIST SP800-61 and SP800-61, Digital forensics examination via NIST SP800-86, Digital forensics using Linux OS based on LEFE guide, Supply chain risk management practices using NIST SP800-161, Policy, legal and ethical implication of security management that addresses HIPAA/ FERPA.

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Prerequisites

Motivated people from diverse backgrounds who want to work in this field. Some knowledge of programming languages, as well as familiarity with Windows, Linux or Unix operating systems, will help with the Cyber Security Engineering Program. Detail-oriented problem-solvers with a technical background are a good fit for the program. We place a higher value on technical ability over formal education. Networking engineering certifications and degrees in technology, science, and mathematics are helpful. Undergraduate Degree or equivalent life experience

Training Purpose
Functional Development
Skill Development
Specific Audience
All
Delivery Method
Online, Self-Paced
  • Online, Self-Paced

Learning Objectives

Self Study in Cyber Security

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Infrastructure Support
  • Cybersecurity Management
  • Digital Forensics
  • Executive Cyber Leadership
  • Incident Response

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: