وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Implementing a Cybersecurity Program

سرفصل های دوره

How to Develop a Comprehensive Cybersecurity Program for Your Organization


1 - Welcome and Getting Started
  • 1 - Welcome
  • 2 - How to Navigate This Course
  • 3 - Course Overview
  • 4 - Syllabus.html
  • 5 - Meet Your Instructor.html

  • 2 - What is a Cybersecurity Program
  • 6 - Module Intro
  • 7 - What is a Cybersecurity Program
  • 8 - Why have a Cybersecurity Program
  • 9 - How does a Security Program Mitigate Risk
  • 10 - Security Program Operations
  • 11 - Cybersecurity Frameworks
  • 12 - Core Cybersecurity Concepts

  • 3 - Implementation Approach
  • 13 - Module Intro
  • 14 - Payoff Model
  • 15 - Choosing an Implementation Approach
  • 16 - Change Management

  • 4 - Lane 1 Start with Action
  • 17 - Module Intro
  • 18 - The Basics
  • 19 - Requirements

  • 5 - Regulatory Compliance
  • 20 - Module Intro
  • 21 - Laws and Regulations Overview
  • 22 - Common Regulatory Components
  • 23 - General Data Protection Regulation GDPR
  • 24 - California Consumer Privacy Act CCPA
  • 25 - Payment Card Industry Data Security Standard PCI DSS
  • 26 - SarbanesOsxley Act SOX
  • 27 - Health Insurance Portability and Accountability Act HIPAA
  • 28 - Cybersecurity Maturity Model Certification CMMC
  • 29 - GrammLeachBliley Act GLBA
  • 30 - Childrens Online Privacy Protection Act COPPA
  • 31 - Family Educational Rights and Privacy Act FERPA

  • 6 - Critical Security Documents
  • 32 - Module Intro
  • 33 - Written Information Security Plan WISP
  • 34 - Acceptable Use Policy AUP
  • 35 - Password Policy
  • 36 - Privacy Policy
  • 37 - Service Level Agreements SLA
  • 38 - OperationalLevel Agreement
  • 39 - PrivacyLevel Agreement
  • 40 - Terms of Service ToS
  • 41 - Data Retention Policy
  • 42 - Master Service Agreements MSA
  • 43 - Statement of Work SoW
  • 44 - NonDisclosure Agreements NDA
  • 45 - Memorandum of Understanding MOU
  • 46 - Interconnect Security Agreement ISA

  • 7 - Security Operations
  • 47 - Module Intro
  • 48 - Compliance Management
  • 49 - Risk Management
  • 50 - Asset Acquisition and Management
  • 51 - Vulnerability Management
  • 52 - Patch Management
  • 53 - Vendor and Supply Chain Management
  • 54 - Personnel Management
  • 55 - Identity and Access Management IAM
  • 56 - Security Awareness Training Management
  • 57 - Change Management
  • 58 - Data Management
  • 59 - Monitoring and Alerting
  • 60 - Incident Management
  • 61 - Contingency Planning
  • 62 - Auditing and Assessments
  • 63 - Program Management

  • 8 - Lane 2 Start with an Assessment
  • 64 - Module Intro
  • 65 - Determining Risk Tolerance
  • 66 - Risk Assessment
  • 67 - Asset Risk Assessment
  • 68 - DEMO Asset Inventory and Assessment
  • 69 - Identify Solutions and ROI
  • 70 - DEMO Solutions and ROI
  • 71 - Prioritizing Work

  • 9 - Lane 3 Start with a Framework
  • 72 - Module Intro
  • 73 - Start with a Framework
  • 74 - Implementing a Framework
  • 75 - Determining Work

  • 10 - Wrap up
  • 76 - Review
  • 77 - Course Wrap up
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 43733
    حجم: 9248 مگابایت
    مدت زمان: 262 دقیقه
    تاریخ انتشار: ۸ اسفند ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید