Type to search LearningTree.com

Do you mean "{{response.correctedQuery}}" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.

 

Security Training









Preferred method of contact?

Cyber Security Risk Assessment & Management

COURSE TYPE

Foundation

Course Number

2013

Duration

4 Days

Enroll

About This Course: Laws and regulations impose stringent cyber security requirements on all organizations. By employing the standards-based risk management process described in this course, you will establish and maintain an acceptable security posture and protect your organization from unacceptable losses.

You Will Learn How To

  • Implement standards-based, proven methodologies for assessing and managing the risks to your organization's information infrastructure
  • Select and implement security controls that ensure compliance with applicable laws, regulations, policies, and directives
  • Extend security protection to Industrial Control Systems and to the Cloud

Course Outline

  • Introduction to Risk Assessment and Management
  • Ensuring compliance with applicable regulatory drivers
  • Protecting the organization from unacceptable losses
  • Describing the Risk Management Framework (RMF)
  • Applying NIST/ISO risk management processes
  • Characterizing System Security Requirements

Defining the system

  • Outlining the system security boundary
  • Pinpointing system interconnections
  • Incorporating the unique characteristics of Industrial Control Systems (ICS) and cloud-based systems

Identifying security risk components

  • Estimating the impact of compromises to confidentiality, integrity and availability
  • Adopting the appropriate model for categorizing system risk

Setting the stage for successful risk management

  • Documenting critical risk assessment and management decisions in the System Security Plan (SSP)
  • Appointing qualified individuals to risk governance roles
  • Selecting Appropriate Security Controls

Assigning a security control baseline

  • Investigating security control families
  • Determining the baseline from system security risk

Tailoring the baseline to fit the system

  • Examining the structure of security controls, enhancements and parameters
  • Binding control overlays to the selected baseline
  • Gauging the need for enhanced assurance
  • Distinguishing system-specific, compensating and non-applicable controls
  • Reducing Risk Through Effective Control Implementation

Specifying the implementation approach

  • Maximizing security effectiveness by "building in" security
  • Reducing residual risk in legacy systems via "bolt-on" security elements

Applying NIST/ISO controls

  • Enhancing system robustness through selection of evaluated and validated components
  • Coordinating implementation approaches to administrative, operational and technical controls
  • Providing evidence of compliance through supporting artifacts
  • Assessing Compliance Scope and Depth

Developing an assessment plan

  • Prioritizing depth of control assessment
  • Optimizing validation through sequencing and consolidation
  • Verifying compliance through tests, interviews and examinations

Formulating an authorization recommendation

  • Evaluating overall system security risk
  • Mitigating residual risks
  • Publishing the Plan of Action and Milestones (POA&M), the risk assessment and recommendation
  • Authorizing System Operation

Aligning authority and responsibility

  • Quantifying organizational risk tolerance
  • Elevating authorization decisions in high-risk scenarios

Forming a risk-based decision

  • Appraising system operational impact
  • Weighing residual risk against operational utility
  • Issuing Authority to Operate (ATO)
  • Maintaining Continued Compliance

Justifying continuous reauthorization

  • Measuring impact of changes on system security posture
  • Executing effective configuration management
  • Performing periodic control reassessment

Preserving an acceptable security posture

  • Delivering initial and routine follow-up security awareness training
  • Collecting on-going security metrics
  • Implementing vulnerability management, incident response and business continuity processes
Show complete outline
Show Less

Course Schedule

Attend this live, instructor-led course In-Class or Online via AnyWare.

Hassle-Free Enrollment: No advance payment required.
Tuition due 30 days after your course.

Oct 11 - 14 Herndon, VA/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Oct 25 - 28 Rockville, MD/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Nov 29 - Dec 2 Herndon, VA/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Jan 3 - 6 New York/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Jan 10 - 13 Ottawa/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Jan 17 - 20 Herndon, VA/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Feb 14 - 17 Alexandria, VA/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Mar 7 - 10 Herndon, VA/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Apr 4 - 7 New York/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Apr 18 - 21 Herndon, VA/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Apr 25 - 28 Rockville, MD/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Jun 13 - 16 Alexandria, VA/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Jun 20 - 23 Herndon, VA/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Jul 18 - 21 New York/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Aug 22 - 25 Rockville, MD/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Guaranteed to Run

Show all dates
Show fewer dates

Bring this Course to Your Organization and Train Your Entire Team
For more information, call 1-888-843-8733 or click here

Tuition

Standard

$2990

Government

$2659

Course Tuition Includes:

After-Course Instructor Coaching
When you return to work, you are entitled to schedule a free coaching session with your instructor for help and guidance as you apply your new skills.

Free Course Exam
You can take your course exam on the last day of your course and receive a Certificate of Achievement with the designation "Awarded with Distinction."

Prev
Next

Questions

Call 1-888-843-8733 or click here »

An experienced training advisor will happily answer any questions you may have and alert you to any tuition savings to
which you or your organization may be entitled.

Training Hours

Standard Course Hours: 9:00 am – 4:30 pm
*Informal discussion with instructor about your projects or areas of special interest: 4:30 pm – 5:30 pm


FREE Online Course Exam (if applicable) – Last Day: 3:30 pm – 4:30 pm
By successfully completing your FREE online course exam, you will:

  • Have a record of your growth and learning results.
  • Bring proof of your progress back to your organization
  • Earn credits toward industry certifications (if applicable)
  • Make progress toward one or more Learning Tree Specialist & Expert Certifications (if applicable)

Enhance Your Credentials with Professional Certification

Learning Tree's comprehensive training and exam preparation guarantees that you will gain the knowledge and confidence to achieve professional certification and advance your career.

This course is approved by CompTIA for continuing education units (CEUs). For additional information and to confirm which courses are eligible towards your CompTIA certification, click here.

Earn 23 Credits from NASBA

This course qualifies for 23 CPE credits from the National Association of State Boards of Accountancy CPE program. Read more ...

- ,

Prev
Next