TRAINING CATEGORIES
(Click Category to List Courses)

42 - IT-S Information Technology - Security and Audit


IT-S 412 - NIST Cybersecurity Framework

Code Start Date Duration Venue
IT-S 412 09 October 2023 5 Days Istanbul Registration Form Link
IT-S 412 04 December 2023 5 Days Istanbul Registration Form Link
Please contact us for fees

 

Course Description

Organizations rely heavily on the use of information technology (IT) products and services to run 

their day-to-day activities. Ensuring the security of these products and services is of the utmost 

importance for the success of the organization. This publication introduces the information 

security principles that organizations may leverage to understand the information security needs 

of their respective systems. 

This training covers the NIST Cyber Security Framework and respective IT controls

Course Objectives

  • Create and share a company cybersecurity policy
  • Control who logs on to your network and uses your computers and other devices
  • Use security software to protect data
  • Encrypt sensitive data, at rest and in transit
  • Conduct regular backups of data

Who Should Attend?

  • IT professionals 
  • Network Administrators 
  • Secuiry Analysts 

Course Details/Schedule

Day 1

  • Introduction to NIST Cybersecurity Controls
  • Elements of Information Security
  • Roles and Responsibilities
  • Threats and Vulnerabilities: A Brief Overview

Day 2

  • Information Security Policy
  • Information Security Risk Management
  • Assurance
  • Authorization
  • Security Engineering
  • Operational Assurance
  • Interdependencies
  • Cost Considerations

Day 3

  • Security Considerations in System Support and Operations
  • User Support
  • Software Support
  • Configuration Management
  • Backups
  • Media Controls
  • Documentation
  • Maintenance
  • Interdependencies
  • Cost Considerations
  • Cryptography
  • Uses 
  • Implementation Issues
 

Day 4

  • Control Families
  • Access Control (AC)
  • Awareness and Training (AT)
  • Audit and Accountability (AU)
  • Assessment, Authorization, and Monitoring (CA)
  • Configuration Management (CM)
  • Contingency Planning (CP)
  • Identification and Authentication (IA)
  • Individual Participation (IP)
  • Incident Response (IR)
  • Maintenance (MA)
 

Day 5

  • STIG
  • Applications
  • Cloud networks
  • Mobile devices
  • Operating systems
  • Browsers
  • Routers and servers
  • Networks
  • Network devices