This courseware is available in a Virtual Classroom configuration.

Implementing the NIST Cybersecurity Framework Using COBIT® 5

In this course, you will understand the context and nature of cybersecurity risks and how to manage these risks using the NIST Cybersecurity Framework together…

Certificate Yes
Duration 2 Days
Delivery Blended, Classroom, Virtual Classroom
Accreditor APMG
Languages English

Please ensure your accreditation for this product. Find out how to get accredited.

What is included in Implementing the NIST Cybersecurity Framework Using COBIT® 5

Course Description

In this course, you will understand the context and nature of cybersecurity risks and how to manage these risks using the NIST Cybersecurity Framework together with COBIT 5. ISO/IEC 27000 is also covered in this course. So if you are already using that standard or interested in applying it as an overall IT Security Management System, this course will be relevant as well.

Target Audience

This course and exam is aimed at individuals who have a basic understanding of both COBIT 5 and security concepts, and who are involved in improving the cybersecurity program for outside organizations or their own.

Course Information

Certification: Yes

Duration: 2 Days

Domain: IT Governance and Strategy

Delivery Method: Blended, Classroom, Virtual Classroom

Accreditor: APMG

Available Languages: English

Purchase Options: Pay Per Use Courseware

Audience

This course and exam is aimed at individuals who have a basic understanding of both COBIT 5 and security concepts, and who are involved in improving the cybersecurity program for outside organizations or their own.

 

Learning Objectives

At the end of this course, participants will be able to:

  • Understand the course objectives and content, exam requirements and learning approach.
  • Understand the context of cybersecurity: the risks, the challenges in managing these risks, and the benefits of aligning the NIST Framework, ISO/IEC 27000 and COBIT 5.
  • Understand an overview of the NIST Cybersecurity Framework, COBIT 5, and ISO/IEC 27000.
  • Understand the objectives and scope of the ISACA Guide and how to use it to implement Step 1 – Prioritise and Scope.
  • Understand how to use the ISACA Guide and to implement Step 2 – Orient and Step 3 – Create a Current Profile.
  • Understand how to use the ISACA Guide and to implement Step 4 – Conduct a Risk Assessment and Step 5 – Create a Target Profile.
  • Understand how to use the ISACA Guide and to implement Step 6 – Determine, Analyse and Prioritise Gaps.
  • Understand how to use the ISACA Guide and to implement Step 7 – Implementation Plan.
  • Understand how to use the ISACA Guide and to implement an Action Plan Review and Manage the Lifecycle.

 

Course Outline

Course Introduction

  • Introductions
  • Course Objectives
  • Agenda
  • Learning Approach

 

Cybersecurity Challenges

  • What is cybersecurity?
  • What are the risks?
  • What are the challenges?
  • What are the benefits:
    • NIST Framework
    • COBIT 5
    • ISO27000

Introducing the Frameworks

  • NIST Core, Tier and Profiles Facts and Concepts
  • How to apply these concepts to a scenario

 

Step 1: Prioritize and Scope

  • The CSF Goals and implementation steps
  • How the CSF relates to the NIST Framework
  • What are the drivers?
  • Implementation Considerations
  • Relevant COBIT 5 Practices

 

Steps 2 and 3: Orient and Create a Current Profile

  • Where are we now?
  • Implementation Considerations
  • Relevant COBIT 5 Practices

 

Step 4 and Step 5: Conduct a Risk Assessment and Create a Target Profile

  • Where do we want to be?
  • Implementation Considerations
  • Relevant COBIT 5 Practices

 

Step 6: Determine, Analyze, and Prioritize Gaps

  • What needs to be done?
  • Implementation Considerations
  • Relevant COBIT 5 Practice

 

Step 7: Implement Action Plan

  • How do we get there?
  • Implementation Considerations
  • Relevant COBIT 5 Practice

 

CSF Action Plan Review and CSF Life Cycle Management

  • Did we Get There
  • Implementation Considerations
  • Relevant COBIT 5 Practices
  • How do we Keep the Momentum Going
  • Implementation Considerations
  • Relevant COBIT 5 Practices

Delivery is subject to EdCast Marketplace terms and conditions.

Benefits of Working with ITpreneurs

Ready-to-use training materials means faster time to revenue. Offer relevant training to your clients: order accredited training materials, book exams, and drive results.

icons8-new-100

Innovative Solutions

We continue to innovate our portfolio. We offer blended learning programs, video-based learning as well as interactive learning tracks.

icons8-easy-100

Convenience

An intuitive ordering process and fully automated delivery portal that integrates with your own delivery processes make your life easy.

icons8-training-100

Instructor Support

You get extensive guidance for instructors, ensuring optimal deliveries, every time. Don’t have an instructor? Use one of ours!

icons8-address-book-2-100

Branded Products

Our printed books, ebooks, or printable books are branded with your logo and name. Your customers will log into your branded portal.

icons8-puzzle-100 (1)

Tailored Portfolio

You get various flavors of courseware, ensuring there always is an option that suits your needs.

icons8-shopping-cart-100

Click and Consume

A flexible pay-per-use model for courseware, exams and instructors offers you full flexibility instantly.

Triangle Left

Partner with ITpreneurs for Implementing the NIST Cybersecurity Framework Using COBIT® 5

Interested in licensing our courseware for your training organization or corporate training environment?

Discover More

new-horizons

New Horizons Trains the IT Generation of Tomorrow with ITpreneurs Products

345678

Using COBIT to Grow Your Training Business

Web-Conferencing-Tools

Comparing The Top 5 Best Video Conferencing Apps