home > training > NCSF-P: NIST Cybersecurity Framework Training – Practitioner Training

NCSF-P: NIST Cybersecurity Framework Training – Practitioner Training

$3,295

  • 3 Days
Partner DeliveryThis live class is delivered by a partner at another location. Students attend online from their home or office.
Live
Online
 
Aug 18 - Aug 20
6:30AM - 2:30PM (PHX)
GTRThis class date is Guaranteed to Run and will not change.
Live Online
Sep 9 - Sep 11
6:30AM - 2:30PM (PHX)
GTRThis class date is Guaranteed to Run and will not change.
Live Online
Oct 14 - Oct 16
6:30AM - 2:30PM (PHX)
GTRThis class date is Guaranteed to Run and will not change.
Live Online
x
Course:
  • This field is for validation purposes and should be left unchanged.

Course Description

The three-day NIST Cybersecurity Practitioner course is designed for individuals within an organization who are directly involved in the planning, design, creation, implementation, and or improvement of a cybersecurity program that will follow the principles of the NIST Cybersecurity Framework. Although some aspects of the course are technical this course also includes risk management, business controls, and guidance for a continuous cybersecurity improvement plan.

Outline

Module 1) Course Introduction

Module 2) Risk Management in the NIST CSF and NIST RMF 

  • Risk Management in the NIST Cybersecurity Framework
  • Analyzing the NIST Risk Management Framework

i. Introduction and History

ii. Purpose and Use Cases

iii. Six Steps

  1. Categorize System
  2. Select Controls
  3. Implement Controls
  4. Assess Controls
  5. Authorize System
  6. Monitor Controls
  • Integrating the Frameworks

Module 3) Real World Attacks

  • Major Cybersecurity Attacks and Breaches
  • Cyber Kill Chain
  • Mitre ATT&CK Matrix

Module 4) Review of the Components of the NIST Cybersecurity Framework

  • Tiers and Tier selection
  • Current and Target Profiles and the Framework Core
  • Deep dive in Informative References

i. Center for Internet Security 20 Critical Security Controls

ii. ISO 27001:2013 Information Security Management System (ISMS)

iii. ISO 27002:2013 Code of Practice

  • Supply Chain Risk Management in the Enterprise

Module 5) Defense in Depth and the NIST Cybersecurity Framework

  • Informative References, Subcategories, and Defense in Depth
  • Aligning vendor Controls with Subcategories
  • Security Operations Center (SOC) activities and Security Information and Event Management solutions in relation to the Framework

Module 6) Assessing Cybersecurity in the Subcategories

  • Creating an Assessment Plan
  • Assigning Roles and Responsibilities
  • Tiers, Threats, Risks, Likelihoods, and Impact

Module 7) Creating a Written Information Security Program

  • The Intersection of Business and Technical Controls
  • What is a Written Information Security Program (WISP)?
  • Creating a WISP Template
  • Aligning Current Profile with a WISP

Module 8) A Practitioner’s Deep Dive into Creating or Improving a Cybersecurity Program 

1) Step 1: Prioritize and Scope

  • a) Identifying organizational priorities
  • b) Aiding and influencing strategic cybersecurity implementation decisions
  • c) Determining scope of the implementation
  • d) Planning for internal adaptation based on business line/process need
  • e) Understanding risk tolerance

2) Step 2: Orient

  • a) Identifying systems and applications which support organizational priorities
  • b) Working with compliance to determine regulatory and other obligations
  • c) Planning for risk responsibility

3) Step 3: Create a Current Profile

  • a) Assessing – self vs. 3rd party
  • b) How to measure real world in relation to the Framework

i) Qualitative and quantitative metrics

ii) Analysis of the Current State in a sample assessment

iii) Implementation Tiers in practice

  • c) Current Profile and Implementation Tiers

4) Step 4: Conduct a Risk Assessment

  • a) Risk assessment options (3rd party vs internal)
  • b) Organizational vs. system level risk assessment
  • c) Risk assessment and external stakeholders

5) Step 5: Create a Target Profile

  • a) Target Profile and Steps 1-4
  • b) Determining desired outcomes with Tiers
  • c) External stakeholder considerations
  • d) Adding Target Profiles outside the Subcategories

6) Step 6: Determine, Analyze, and Prioritize Gaps

  • a) Defining and determining Gaps
  • b) Gap analysis and required resources
  • c) Organizational factors in creating a prioritized action plan

7) Step 7: Implement Action Plan

  • a) Implementation team design from Executives to Technical Practitioners
  • b) Assigning tasks when priorities conflict
  • c) Considering compliance and privacy obligations
  • d) Taking action
  • e) Reporting and reviewing

Module 9) Continuous Cybersecurity Improvement 

  • Creating a continuous improvement plan
  • Implementing ongoing assessments

Audience

This class is designed for individuals within an organization who are directly involved in the planning, design, creation, implementation, and or improvement of a cybersecurity program that will follow the principles of the NIST Cybersecurity Framework.

Prerequisites

Individuals should have already taken the NIST Cybersecurity Framework (NCSF) Foundation Training course or have significant experience with the NIST Cybersecurity Framework.