Section 1 : Introduction
|
Lecture 1 | What You will learn in this course | 00:03:14 Duration |
|
Lecture 2 | Introduction | 00:04:49 Duration |
|
Lecture 3 | Integrating Cybersecurity and ERM | 00:02:45 Duration |
Section 2 : The Course case study
|
Lecture 1 | Target Cloud Inc | 00:03:03 Duration |
Section 3 : IT Cyber Security Risk
|
Lecture 1 | What is Risk | 00:06:49 Duration |
|
Lecture 2 | Assets, threats, and vulnerabilities | 00:03:43 Duration |
|
Lecture 3 | Organization’s crown jewels | 00:05:09 Duration |
|
Lecture 4 | The Risk-Based Security Approach | 00:04:28 Duration |
|
Lecture 5 | The Need For Risk Assessment | |
|
Lecture 6 | Conducting an IT Risk Assessment | 00:11:29 Duration |
|
Lecture 7 | Business Impact Analysis (BIA) | 00:06:04 Duration |
|
Lecture 8 | A Risk Cost-Benefit Analysis | 00:02:21 Duration |
|
Lecture 9 | Enterprise Risk Management Strategy | 00:07:00 Duration |
|
Lecture 10 | Risk Analysis Methods | 00:05:35 Duration |
Section 4 : NIST 800-37 R2 Risk Management Framework
|
Lecture 1 | NIST Risk Management Framework for Information Systems and Organization | 00:07:01 Duration |
Section 5 : RMF Preparation Step 1
|
Lecture 1 | NIST Risk Management Preparation Strategy | 00:05:00 Duration |
Section 6 : RMF Categorize Information Systems Step 2
|
Lecture 1 | Define System Categorization, Scope, and Authorization Boundaries |
Section 7 : RMF Select Security Controls Step 3
|
Lecture 1 | Introduction to NIST Security Controls | 00:04:27 Duration |
|
Lecture 2 | High Water Mark Concept and the Security Control Baseline | 00:03:50 Duration |
|
Lecture 3 | Selecting NIST Security Controls | 00:04:53 Duration |
Section 8 : RMF Implement NIST Security Controls step 4
|
Lecture 1 | NIST Security Controls Implementation | 00:03:43 Duration |
|
Lecture 2 | Tailoring NIST Control Baselines | 00:02:43 Duration |
Section 9 : RMF Assess Security Controls step 5
|
Lecture 1 | Assigning NIST RMF Assessment Objectives | 00:03:47 Duration |
|
Lecture 2 | NIST Security Controls Assessment | 00:05:49 Duration |
|
Lecture 3 | Penetration Testing | 00:02:43 Duration |
|
Lecture 4 | NIST RMF Assessment Results |
Section 10 : RMF Authorize Information System step 6
|
Lecture 1 | RMF Authorization | 00:03:15 Duration |
Section 11 : RMF Monitor Security Controls step 7
|
Lecture 1 | NIST RMF Monitoring | 00:05:15 Duration |
|
Lecture 2 | Monitoring is an Ongoing Process | 00:06:04 Duration |
Section 12 : NIST RMF Knowledge Resources and Best Practices
|
Lecture 1 | Tips For Streamlining RMF Implementation | |
|
Lecture 2 | NIST RMF Best practices and Knowledge Resources |
Section 13 : CMMI maturity model and NIST RMF
|
Lecture 1 | NIST CMMI Maturity Model | 00:03:22 Duration |
Section 14 : Cyber Security Risk Metrics Indicators
|
Lecture 1 | Cyber Security Risk Metrics and Performance indicators | 00:05:21 Duration |
Section 15 : NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs)
|
Lecture 1 | NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs) | 00:01:51 Duration |
Section 16 : Conclusions
|
Lecture 1 | Conclusions | 00:02:36 Duration |