Modules
1 -
Introduction
#
Lesson
Duration
Type
1.
Introduction
13m:46s

2.
Download your free study guide

3.
Exam Tips
5m:15s

4.
100% Pass Guarantee
3m:8s

5.
A/CCRF and A/CCRP
6m:28s

6.
Checkpoint: Introduction

2 -
Cybersecurity Fundamentals
#
Lesson
Duration
Type
1.
Cybersecurity Fundamentals
2m:38s

2.
Key Terms in Cybersecurity
8m:39s

3.
The CIANA Pentagon
8m:45s

4.
Threats and Vulnerabilities
5m:17s

5.
Determining Risk
5m:56s

6.
Checkpoint: Cybersecurity Fundamentals

3 -
Risk Management Fundamentals
#
Lesson
Duration
Type
1.
Risk Management Fundamentals
5m:50s

2.
Phase 1 - Risk Identification
5m:55s

3.
Phase 2 - Risk Assessment
9m:32s

4.
Phase 3 - Risk Planning
7m:5s

5.
Phase 4 - Risk Mitigation
4m:18s

6.
Phase 5 - Risk Monitoring and Review
2m:4s

7.
Inherent and Residual Risk
4m:38s

8.
Business Impact Analysis
10m:30s

9.
Financial Analysis
9m:25s

10.
Checkpoint: Risk Management Fundamentals

4 -
NIST Cybersecurity Framework
#
Lesson
Duration
Type
1.
NIST Cybersecurity Framework (CSF)
4m:10s

2.
NIST CSF Development
8m:35s

3.
Executive Orders and Regulations
6m:29s

4.
Applicability of the NIST CSF
6m:15s

5.
Characteristics of the Framework
4m:57s

6.
Cyber Resilience
3m:56s

7.
Critical Infrastructure
9m:32s

8.
Audience for the NIST CSF
3m:17s

9.
Purpose of the NIST CSF
4m:39s

10.
Checkpoint: NIST Cybersecurity Framework

5 -
Framework Components
#
Lesson
Duration
Type
1.
Framework Components
2m:7s

2.
Overview of the Framework Core
5m:6s

3.
Overview of the Implementation Tiers
6m:19s

4.
Overview of Framework Profiles
5m:24s

5.
Checkpoint: Framework Components

6 -
The Six Functions
#
Lesson
Duration
Type
1.
The Six Functions
4m:56s

2.
Govern (GV)
11m:52s

3.
Identify (ID)
7m:14s

4.
Protect (PR)
8m:4s

5.
Detect (DE)
4m:14s

6.
Respond (RS)
5m:20s

7.
Recover (RC)
4m:16s

8.
Checkpoint: The Six Functions

7 -
Controls and Outcomes
#
Lesson
Duration
Type
1.
Controls and Outcomes
5m:28s

2.
Controls
3m:15s

3.
Voluntary Nature of the NIST CSF
6m:9s

4.
Outcomes
8m:18s

5.
Informative References
3m:56s

6.
ISO/IEC 27001 and 27002
4m:34s

7.
NIST Special Publications
5m:20s

8.
CIS CSC
1m:54s

9.
COBIT 5
1m:55s

10.
ITIL
2m:37s

11.
PCI DSS
2m:32s

12.
HIPAA
2m:27s

13.
NERC CIP
2m:23s

14.
FedRAMP
2m:39s

15.
STAR
3m:27s

16.
OWASP
2m:52s

17.
Checkpoint: Controls and Outcomes

8 -
Implementation Tiers
#
Lesson
Duration
Type
1.
Implementation Tiers
3m:22s

2.
Choosing an Implementation Tier
5m:14s

3.
Implementation Tier Progression
5m:56s

4.
Maturity Models
7m:42s

5.
Moving Between Implementation Tiers
6m:47s

6.
Checkpoint: Implementation Tiers

9 -
Using the Profiles
#
Lesson
Duration
Type
1.
Using the Profiles
4m:23s

2.
Key Components
4m:23s

3.
Creating a Profile
6m:25s

4.
Profile Tailoring
7m:23s

5.
Profile Templates
4m:34s

6.
Current and Target Profiles
2m:43s

7.
Profiles for Regulatory Compliance
3m:13s

8.
Secure Once and Comply Many
9m:19s

9.
Checkpoint: Using the Profiles

10 -
Sector-specific Profiles
#
Lesson
Duration
Type
1.
Sector-specific Profiles
3m:35s

2.
CRI Profile
4m:32s

3.
Manufacturing Profile
8m:13s

4.
Election Infrastructure Profile
2m:16s

5.
Satellite Networks Profile
2m:10s

6.
Smart Grid Profile
1m:55s

7.
Connected Vehicle Profile
2m:36s

8.
Payroll Profile
2m:17s

9.
Maritime Profile
2m:16s

10.
Communications Profile
2m:10s

11.
Checkpoint: Sector-specific Profiles

11 -
Assessing Cybersecurity Risk
#
Lesson
Duration
Type
1.
Assessing Cybersecurity Risk
3m:37s

2.
Case Study Overview
2m:52s

3.
Identifying Threats
2m:7s

4.
Identifying Vulnerabilities
2m:34s

5.
Identifying Risks
3m:2s

6.
Risk Mitigation Recommendations
2m:14s

7.
Benefits and Trade-offs
3m:43s

8.
Evaluating Effectiveness
2m:39s

9.
Risk Management Plan
2m:22s

10.
Cybersecurity Strategy
2m:30s

11.
Checkpoint: Assessing Cybersecurity Risk

12 -
Conclusion
#
Lesson
Duration
Type
1.
Conclusion
13m:37s

2.
BONUS: What comes next?
4m:1s

3.
Practice Exam
