NIST Cybersecurity Framework (NCSF) Practitioner

Our classes are always live and instructor led from our Exton, PA or EPIC Partner locations. Springhouse AnywhereLive options require Internet Access. Select classes are Guaranteed to Run (GTR). View our complete schedule policies.

 

 

 

 

7e66ea67-b765-e811-b7b7-00155d0a14062018-08-28T08:00:00Z3295.00000000000149:30 AM5:30 PMAnywhereLive7e66ea67-b765-e811-b7b7-00155d0a1406
36c9a972-b765-e811-b7b7-00155d0a14062018-09-18T08:00:00Z3295.00000000000149:30 AM5:30 PMAnywhereLive36c9a972-b765-e811-b7b7-00155d0a1406

Overview

​The NIST Cybersecurity Framework (NCSF) Practitioner program teaches the knowledge to prepare for the NSCF Practitioner exam plus the skills and abilities to design, build, test, manage and improve a cybersecurity program based on the NCSF. This program is positioned to IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSF) across an enterprise and its supply chain. 

This course looks at cybersecurity risks and instructs students on the best approach to design and build a comprehensive technology focused cybersecurity program and business focused cyber-risk management program that will minimize risks, and at the same time, protect critical assets.
The class will include lectures, informative supplemental reference materials, quizzes, exercises and tests. Outcomes and benefits from this class is a practical approach that students can use to build and maintain comprehensive cybersecurity and cyber-risk management programs.

The optional certification exam is through ACQUIROS. Student must pass a 180 minute, 100 question closed book multiple choice, examination with a passing score of 70% in order to receive this certification. 

Intended Audience

​Individuals should hold a valid NIST Cybersecurity Foundation Certification or have equivalent knowledge.


At Completion


Prerequisites


Exams & Certifications


Materials


Course Outline

​CHAPTER 1: COURSE OVERVIEW

Reviews at a high level each chapter of the course

CHAPTER 2: FRAMING THE PROBLEM

Reviews the main business and technical issues that we will address through the course.

CHAPTER 3: THE CONTROLS FACTORY MODEL

Introduces the concept of a Controls factory model and the three areas of focus, the Engineering Center, the Technology Center, and the Business Center.

CHAPTER 4: THE THREATS AND VULNERABILITIES

Provides an overview of cyber -attacks (using the Cyber Attack Chain Model), discusses the top 15 attacks of 2015 and 2016, and the most common technical and business vulnerabilities.

CHAPTER 5: THE ASSETS AND IDENTITIES

Provides a detailed discussion of asset families, key architecture diagrams, an analysis of business and technical roles, and a discussion of governance and risk assessment.

CHAPTER 6: THE CONTROLS FRAMEWORK

Provides a detailed analysis of the controls framework based on the NIST Cybersecurity Framework. Includes the five core functions (Identify, Protect, Detect, Respond and Recover).

CHAPTER 7: THE TECHNOLOGY CONTROLS

Provides a detailed analysis of the technical controls based on the Center for Internet Security 20 Critical Security Controls©. Includes the controls objective, controls design, controls details, and a diagram for each control.

CHAPTER 8: THE SECURITY OPERATIONS CENTER (SOC)

Provides a detailed analysis of Information Security Continuous Monitoring (ISCM) purpose and capabilities. Includes an analysis of people, process, technology, and services provided by a Security Operations Center.

CHAPTER 9: TECHNICAL PROGRAM TESTING AND ASSURANCE

Provides a high-level analysis of technology testing capabilities based on the PCI Data Security Standard (DSS). The testing capabilities include all 12 Requirements of the standard.

CHAPTER 10: THE BUSINESS CONTROLS

Provides a high-level analysis of the business controls based on the ISO 27002:2013 Code of Practice. Includes the controls clauses, objective, and implementation overview. The business controls are in support of ISO 27001 Information Security Management System (ISMS).

CHAPTER 11: WORKFORCE DEVELOPMENT

Provides a review of cybersecurity workforce demands and workforce standards based on the NICE Cybersecurity Workforce Framework (NCWF).

CHAPTER 12: THE CYBER RISK PROGRAM

Provides a review of the AICPA Proposed Description Criteria for Cybersecurity Risk Management. Covers the 9 Description Criteria Categories and the 31 Description Criteria.

CHAPTER 13: CYBERSECURITY PROGRAM ASSESSMENT

Provides a detailed review of the key steps organizations can use for conducting a Cybersecurity Program Assessment. Assessment results include a technical scorecard (based on the 20 critical controls), an executive report, a gap analysis and an implementation roadmap.

CHAPTER 14: CYBER-RISK PROGRAM ASSESSMENT

Provides a review of the Cyber Risk Management Program based on the five Core Functions of the NIST Cybersecurity Framework. This chapter includes a resource guide by the Conference of State Bank Supervisors (CSBS), 'Cybersecurity 101 - A Resource Guide for Bank Executives'. Results include a sample business scorecard, executive report, gap analysis and an implementation roadmap.

 

 

NIST Cybersecurity Framework (NCSF) Practitionerhttp://springhouse.com/course-catalog/NIST_CYBERSECURITY_FRAMEWORK_NCSF_PRACTICTIONERNIST Cybersecurity Framework (NCSF) Practitioner

Get More Information
Name:

Phone:  

Email:  

Comments:

Help us prove you're not a robot:
 

 ‭(Hidden)‬ Catalog-Item Reuse

Microsoft Gold Partner

PMI R.E.P.

AXELOS Limited

The Microsoft Gold CPLS logo is a mark of Microsoft, Inc.

The PMI R.E.P. logo is a mark of the Project Management Institute, Inc.

ITIL® is a registered trade mark of AXELOS Limited.
IT Infrastructure Library® is a registered trade mark of AXELOS Limited
The Swirl logo™ is a registered trade mark of AXELOS Limited
Accredited course material is property of ITSM Academy.

Connect with us

Springhouse Education & Consulting Services

Corporate HQ:Eagleview Corporate Park
707 Eagleview Boulevard
Suite 207
Exton, PA 19341

610-321-3500 - info@springhouse.com