وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Building and Managing a Cybersecurity Program

سرفصل های دوره

Building and managing a cybersecurity program is not for the faint of heart! The landscape is vast, complex, uncertain, and downright weird. After all, who else’s job is it to think of all the ways your organization can digitally fail and describe them in a business-friendly way? In this course—the first in a two-part series—instructor Kip Boyle guides you through the entire program construction process, including team building, program management workflow, and demonstrating compliance and progress. Check out the second course in this series, Measuring and Managing Top Cyber Risks, to take a more focused look at how to systematically assess and mitigate threats.


01 - Introduction
  • 01 - Protect against cyberattacks
  • 02 - What you should know

  • 02 - 1. Defining Key Terms
  • 01 - What is information security
  • 02 - Cybersecurity overview
  • 03 - Cyber resilience overview
  • 04 - Risk management overview
  • 05 - Challenge Prepare and recover
  • 06 - Solution Prepare and recover

  • 03 - 2. Cybersecurity Program Goals
  • 01 - Achieve your customers expectations
  • 02 - Cyberattack and failure resilience
  • 03 - Compliance with laws and regulations
  • 04 - Executive and BOD support
  • 05 - Challenge Customer security requirements
  • 06 - Solution Customer security requirements

  • 04 - 3. Cybersecurity Program Components
  • 01 - Essential functions of a program
  • 02 - Determine your role
  • 03 - Build a team
  • 04 - The need for management
  • 05 - The need for leadership
  • 06 - Challenge Core competencies
  • 07 - Solution Core competencies

  • 05 - 4. Structuring a Cybersecurity Program
  • 01 - Sources of controls
  • 02 - Organize around cyber resilience
  • 03 - Information security program design
  • 04 - Challenge Customer requirements
  • 05 - Solution Customer requirements

  • 06 - 5. Demonstrate Compliance and Progress
  • 01 - Communicate with executives
  • 02 - Communicate with stakeholders
  • 03 - Communicate with auditors
  • 04 - Construct an annual program of work
  • 05 - Challenge Optimize a cybersecurity program
  • 06 - Solution Optimize a cybersecurity program

  • 07 - Conclusion
  • 01 - Next steps for cybersecurity programs
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 15491
    حجم: 357 مگابایت
    مدت زمان: 105 دقیقه
    تاریخ انتشار: ۱۲ تیر ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید