Section 1 : Introduction

Lecture 1 What You will learn in this course 00:03:14 Duration
Lecture 2 Introduction 00:04:49 Duration
Lecture 3 Integrating Cybersecurity and ERM 00:02:45 Duration

Section 2 : The Course case study

Lecture 1 Target Cloud Inc 00:03:03 Duration

Section 3 : IT Cyber Security Risk

Lecture 1 What is Risk 00:06:49 Duration
Lecture 2 Assets, threats, and vulnerabilities 00:03:43 Duration
Lecture 3 Organization’s crown jewels 00:05:09 Duration
Lecture 4 The Risk-Based Security Approach 00:04:28 Duration
Lecture 5 The Need For Risk Assessment
Lecture 6 Conducting an IT Risk Assessment 00:11:29 Duration
Lecture 7 Business Impact Analysis (BIA) 00:06:04 Duration
Lecture 8 A Risk Cost-Benefit Analysis 00:02:21 Duration
Lecture 9 Enterprise Risk Management Strategy 00:07:00 Duration
Lecture 10 Risk Analysis Methods 00:05:35 Duration

Section 4 : NIST 800-37 R2 Risk Management Framework

Lecture 1 NIST Risk Management Framework for Information Systems and Organization 00:07:01 Duration

Section 5 : RMF Preparation Step 1

Lecture 1 NIST Risk Management Preparation Strategy 00:05:00 Duration

Section 6 : RMF Categorize Information Systems Step 2

Lecture 1 Define System Categorization, Scope, and Authorization Boundaries

Section 7 : RMF Select Security Controls Step 3

Lecture 1 Introduction to NIST Security Controls 00:04:27 Duration
Lecture 2 High Water Mark Concept and the Security Control Baseline 00:03:50 Duration
Lecture 3 Selecting NIST Security Controls 00:04:53 Duration

Section 8 : RMF Implement NIST Security Controls step 4

Lecture 1 NIST Security Controls Implementation 00:03:43 Duration
Lecture 2 Tailoring NIST Control Baselines 00:02:43 Duration

Section 9 : RMF Assess Security Controls step 5

Lecture 1 Assigning NIST RMF Assessment Objectives 00:03:47 Duration
Lecture 2 NIST Security Controls Assessment 00:05:49 Duration
Lecture 3 Penetration Testing 00:02:43 Duration
Lecture 4 NIST RMF Assessment Results

Section 10 : RMF Authorize Information System step 6

Lecture 1 RMF Authorization 00:03:15 Duration

Section 11 : RMF Monitor Security Controls step 7

Lecture 1 NIST RMF Monitoring 00:05:15 Duration
Lecture 2 Monitoring is an Ongoing Process 00:06:04 Duration

Section 12 : NIST RMF Knowledge Resources and Best Practices

Lecture 1 Tips For Streamlining RMF Implementation
Lecture 2 NIST RMF Best practices and Knowledge Resources

Section 13 : CMMI maturity model and NIST RMF

Lecture 1 NIST CMMI Maturity Model 00:03:22 Duration

Section 14 : Cyber Security Risk Metrics Indicators

Lecture 1 Cyber Security Risk Metrics and Performance indicators 00:05:21 Duration

Section 15 : NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs)

Lecture 1 NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs) 00:01:51 Duration

Section 16 : Conclusions

Lecture 1 Conclusions 00:02:36 Duration