وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Implementing a Cybersecurity Program

سرفصل های دوره

How to Develop a Comprehensive Cybersecurity Program for Your Organization


1 - Welcome and Getting Started
  • 1 - Welcome
  • 2 - How to Navigate This Course
  • 3 - Course Overview
  • 4 - Syllabus.html
  • 5 - Meet Your Instructor.html

  • 2 - What is a Cybersecurity Program
  • 6 - Module Intro
  • 7 - What is a Cybersecurity Program
  • 8 - Why have a Cybersecurity Program
  • 9 - How does a Security Program Mitigate Risk
  • 10 - Security Program Operations
  • 11 - Cybersecurity Frameworks
  • 12 - Core Cybersecurity Concepts

  • 3 - Implementation Approach
  • 13 - Module Intro
  • 14 - Payoff Model
  • 15 - Choosing an Implementation Approach
  • 16 - Change Management

  • 4 - Lane 1 Start with Action
  • 17 - Module Intro
  • 18 - The Basics
  • 19 - Requirements

  • 5 - Regulatory Compliance
  • 20 - Module Intro
  • 21 - Laws and Regulations Overview
  • 22 - Common Regulatory Components
  • 23 - General Data Protection Regulation GDPR
  • 24 - California Consumer Privacy Act CCPA
  • 25 - Payment Card Industry Data Security Standard PCI DSS
  • 26 - SarbanesOsxley Act SOX
  • 27 - Health Insurance Portability and Accountability Act HIPAA
  • 28 - Cybersecurity Maturity Model Certification CMMC
  • 29 - GrammLeachBliley Act GLBA
  • 30 - Childrens Online Privacy Protection Act COPPA
  • 31 - Family Educational Rights and Privacy Act FERPA

  • 6 - Critical Security Documents
  • 32 - Module Intro
  • 33 - Written Information Security Plan WISP
  • 34 - Acceptable Use Policy AUP
  • 35 - Password Policy
  • 36 - Privacy Policy
  • 37 - Service Level Agreements SLA
  • 38 - OperationalLevel Agreement
  • 39 - PrivacyLevel Agreement
  • 40 - Terms of Service ToS
  • 41 - Data Retention Policy
  • 42 - Master Service Agreements MSA
  • 43 - Statement of Work SoW
  • 44 - NonDisclosure Agreements NDA
  • 45 - Memorandum of Understanding MOU
  • 46 - Interconnect Security Agreement ISA

  • 7 - Security Operations
  • 47 - Module Intro
  • 48 - Compliance Management
  • 49 - Risk Management
  • 50 - Asset Acquisition and Management
  • 51 - Vulnerability Management
  • 52 - Patch Management
  • 53 - Vendor and Supply Chain Management
  • 54 - Personnel Management
  • 55 - Identity and Access Management IAM
  • 56 - Security Awareness Training Management
  • 57 - Change Management
  • 58 - Data Management
  • 59 - Monitoring and Alerting
  • 60 - Incident Management
  • 61 - Contingency Planning
  • 62 - Auditing and Assessments
  • 63 - Program Management

  • 8 - Lane 2 Start with an Assessment
  • 64 - Module Intro
  • 65 - Determining Risk Tolerance
  • 66 - Risk Assessment
  • 67 - Asset Risk Assessment
  • 68 - DEMO Asset Inventory and Assessment
  • 69 - Identify Solutions and ROI
  • 70 - DEMO Solutions and ROI
  • 71 - Prioritizing Work

  • 9 - Lane 3 Start with a Framework
  • 72 - Module Intro
  • 73 - Start with a Framework
  • 74 - Implementing a Framework
  • 75 - Determining Work

  • 10 - Wrap up
  • 76 - Review
  • 77 - Course Wrap up
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 43733
    حجم: 9248 مگابایت
    مدت زمان: 262 دقیقه
    تاریخ انتشار: ۸ اسفند ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید