When you enroll through our links, we may earn a small commission—at no extra cost to you. This helps keep our platform free and inspires us to add more value.

Selection and Implementation of Security Controls
Selection and Implementation of Cybersecurity Risks Controls

This Course Includes
udemy
4.2 (6 reviews )
3h 6m
english
Online - Self Paced
professional certificate
Udemy
About Selection and Implementation of Security Controls
This course was developed as a means of helping entry-level as well as seasoned cybersecurity professionals, to develop a more holistic rather than isolated approach to implementing controls to address cyber or information security risks. The content of this course is as follows:
SECTION 1 TOPICS
1a-Course Intro 1b-Course Intro- The Case at hand 2-About the course 3-Meet your Instructor-Mentor 4-Course Roadmap 5-Approach to Control Selection_ pt1 6-Approach to Control Selection_ pt2 7-Applying same approach to real Data Breaches at a high-level 8-Introduction to security controls 9-Key considerations for the identification- selection & implementation of controls 10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis 11-Cost Benefit Analysis associated with controls selection 12-Technology integration, Operational impact, continuous monitoring, Employee training 13-Regulatory Compliance, Incident Response Planning
SECTION 2 TOPICS
14-High-level process of selecting controls to protect eCommerce web server-Pt1 14-High-level process of selecting controls to protect eCommerce web server-Pt2 15-Steps involved in assessing the identified cyber risks in web server 16-Identify assets, identify threats, identify vulnerabilities 17-Determine likelihood, Impact, Calculate risk 18-Documenting Cybersecurity Risk Assessment Report-Pt 2 18-Documenting Cybersecurity Risk Assessment Report-Pt 1 19-The role of governance in the effective selection and implementation of cybersecurity controls 20-Why not implement frameworks that already have recommended controls 21-Challenges, considerations & disadvantages associated with implementing frameworks-Pt 1 21-Challenges, considerations & disadvantages associated with implementing frameworks-Pt 2 22-When to, versus when not to use frameworks for the selection and implementation of controls 23-Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF) Pt1 23-Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF) Pt2 24-Implementation Plan for identified controls 25- Measuring the effectiveness of implemented controls 26-Putting it all together-The Selection and Implementation of Cybersecurity Risks Controls 27-Course Recap-END
ASSIGNMENT-Research
What You Will Learn?
- Student will learn how to holistically apply a 360 degree approach to the selection and implementation of security risks control measures .
- Key considerations for the identification, selection & implementation of security controls .
- High-level process of selecting controls to protect\ address idenitfied security risks on ecommerce web server .
- The role of governance in the effective selection and implementation of cybersecurity controls .
- Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF).