Section 1 : Introduction

Lecture 1 What You will learn in this course 3:14
Lecture 2 Introduction 4:49
Lecture 3 Integrating Cybersecurity and ERM 2:45

Section 2 : The Course case study

Lecture 4 Target Cloud Inc 3:3

Section 3 : IT Cyber Security Risk

Lecture 5 What is Risk 6:49
Lecture 6 Assets, threats, and vulnerabilities 3:43
Lecture 7 Organization’s crown jewels 5:9
Lecture 8 The Risk-Based Security Approach 4:28
Lecture 9 The Need For Risk Assessment
Lecture 10 Conducting an IT Risk Assessment 11:29
Lecture 11 Business Impact Analysis (BIA) 6:4
Lecture 12 A Risk Cost-Benefit Analysis 2:21
Lecture 13 Enterprise Risk Management Strategy 7:0
Lecture 14 Risk Analysis Methods 5:35

Section 4 : NIST 800-37 R2 Risk Management Framework

Lecture 15 NIST Risk Management Framework for Information Systems and Organization 7:1

Section 5 : RMF Preparation Step 1

Lecture 16 NIST Risk Management Preparation Strategy 5:0

Section 6 : RMF Categorize Information Systems Step 2

Lecture 17 Define System Categorization, Scope, and Authorization Boundaries

Section 7 : RMF Select Security Controls Step 3

Lecture 18 Introduction to NIST Security Controls 4:27
Lecture 19 High Water Mark Concept and the Security Control Baseline 3:50
Lecture 20 Selecting NIST Security Controls 4:53

Section 8 : RMF Implement NIST Security Controls step 4

Lecture 21 NIST Security Controls Implementation 3:43
Lecture 22 Tailoring NIST Control Baselines 2:43

Section 9 : RMF Assess Security Controls step 5

Lecture 23 Assigning NIST RMF Assessment Objectives 3:47
Lecture 24 NIST Security Controls Assessment 5:49
Lecture 25 Penetration Testing 2:43
Lecture 26 NIST RMF Assessment Results

Section 10 : RMF Authorize Information System step 6

Lecture 27 RMF Authorization 3:15

Section 11 : RMF Monitor Security Controls step 7

Lecture 28 NIST RMF Monitoring 5:15
Lecture 29 Monitoring is an Ongoing Process 6:4

Section 12 : NIST RMF Knowledge Resources and Best Practices

Lecture 30 Tips For Streamlining RMF Implementation
Lecture 31 NIST RMF Best practices and Knowledge Resources

Section 13 : CMMI maturity model and NIST RMF

Lecture 32 NIST CMMI Maturity Model 3:22

Section 14 : Cyber Security Risk Metrics Indicators

Lecture 33 Cyber Security Risk Metrics and Performance indicators 5:21

Section 15 : NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs)

Lecture 34 NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs) 1:51

Section 16 : Conclusions

Lecture 35 Conclusions 2:36