(Click Category to List Courses)
42 - IT-S Information Technology - Security and Audit
IT-S 412 - NIST Cybersecurity Framework
Code | Start Date | Duration | Venue | |
---|---|---|---|---|
IT-S 412 | 09 October 2023 | 5 Days | Istanbul | Registration Form Link |
IT-S 412 | 04 December 2023 | 5 Days | Istanbul | Registration Form Link |
Course Description
Organizations rely heavily on the use of information technology (IT) products and services to run
their day-to-day activities. Ensuring the security of these products and services is of the utmost
importance for the success of the organization. This publication introduces the information
security principles that organizations may leverage to understand the information security needs
of their respective systems.
This training covers the NIST Cyber Security Framework and respective IT controls
Course Objectives
- Create and share a company cybersecurity policy
- Control who logs on to your network and uses your computers and other devices
- Use security software to protect data
- Encrypt sensitive data, at rest and in transit
- Conduct regular backups of data
Who Should Attend?
- IT professionals
- Network Administrators
- Secuiry Analysts
Course Details/Schedule
Day 1
- Introduction to NIST Cybersecurity Controls
- Elements of Information Security
- Roles and Responsibilities
- Threats and Vulnerabilities: A Brief Overview
Day 2
- Information Security Policy
- Information Security Risk Management
- Assurance
- Authorization
- Security Engineering
- Operational Assurance
- Interdependencies
- Cost Considerations
Day 3
- Security Considerations in System Support and Operations
- User Support
- Software Support
- Configuration Management
- Backups
- Media Controls
- Documentation
- Maintenance
- Interdependencies
- Cost Considerations
- Cryptography
- Uses
- Implementation Issues
Day 4
- Control Families
- Access Control (AC)
- Awareness and Training (AT)
- Audit and Accountability (AU)
- Assessment, Authorization, and Monitoring (CA)
- Configuration Management (CM)
- Contingency Planning (CP)
- Identification and Authentication (IA)
- Individual Participation (IP)
- Incident Response (IR)
- Maintenance (MA)
Day 5
- STIG
- Applications
- Cloud networks
- Mobile devices
- Operating systems
- Browsers
- Routers and servers
- Networks
- Network devices