• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

16 NIST Cybersecurity Framework (CSF) courses delivered Online

NIST Cybersecurity Professional Foundation

By IIL Europe Ltd

This course teaches business leaders and operational stakeholders the fundamentals of communicating with executive leadership on WHAT investments must be made to operationalize the NIST Cybersecurity Framework and its informative references to facilitate secure, resilient, and auditable digital outcomes. This course also introduces candidates to the DVMS Institute Create, Protect, and Deliver (CPD) overlay model. As Cloud Services revolutionized the creation and management of digital infrastructure, the DVMS CPD Overlay Model, underpinned by well-known frameworks from NIST and standards from ISO, will revolutionize how organizations manage their digital risk, resiliency, and privacy. Course Features • Foundation Certificate digital courseware • A Practical Guide to 'Adopting the NIST Cybersecurity Framework' eBook • Exam Voucher • Certificate of Attendance • Foundation Certificate Digital Badge on successful completion of exam • Access to the NIST Cybersecurity Professional LinkedIn community This Foundation level course covers the following topics: Today's Digital Economy Understanding Cyber Risks The NIST Cybersecurity Framework Fundamentals Core Functions, Categories, and Subcategories Implementation Tiers Developing Framework Profiles Cybersecurity Improvement NIST Cybersecurity Professional certification training programs are accredited by APMG International, certified by the National Cybersecurity Council (NCSC) in the UK, and recognized by the U.S. Department of Homeland Security CISA organization as qualified NIST Cybersecurity Framework training in alignment with the cybersecurity roles defined in the NICE Cybersecurity Workforce Framework.

NIST Cybersecurity Professional Foundation
Delivered Online On Demand18 hours
£995

NCSP 800-171 Specialist

By IIL Europe Ltd

The NCSP® 800-171 Specialist accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the 800-171 controls in the context of a NIST Cybersecurity Framework program. This course looks at the impact of adapting a principled approach to the enterprise risk management (ERM) framework to better support cybersecurity decisions, establishing the context for the selected informative reference (IR). It guides participants on the best approach to adapting, implementing, and operating (AIO) a comprehensive cybersecurity program that can be integrated into the existing organizational capabilities and incorporates the selected IR. NCSP® 800-171 Specialist introduces the integration of typical enterprise capabilities with cybersecurity from the selected cybersecurity IR perspective. The overall approach places these activities into a systems-thinking context by introducing the service value management system (SVMS), including governance, assurance, and the Z-X model. With this in place, the course presents the approach to adapt, implement, operate, and improve the organizational cybersecurity posture that builds on the application of the FastTrack™ concept presented in the NCSP Practitioner course. The NIST Cybersecurity Professional (NCSP®) program is the industry's first accredited certification training program that teaches organizations how to build a Digital Value Management Overlay System capable of leveraging the NIST Cybersecurity Framework to deliver the secure, digital business outcomes expected by executives, government regulators, and legal advisors.

NCSP 800-171 Specialist
Delivered OnlineFlexible Dates
£2,995

NCSP Foundation Certification Training

By IIL Europe Ltd

The NCSP® Foundation accredited (APMG International), certified (NCSC/GCHQ-UK) and recognized (DHS-CISA-USA) certification course introduces business, technology, auditing, and management professionals to the fundamentals of digital business, its risks, and the NIST Cybersecurity Framework's role in helping organizations manage and mitigate digital risk. This course also introduces candidates to an Affordable, Pragmatic, and Scalable Digital Value Management System (DVMS) Create, Protect, and Deliver (CPD) model designed to enable any size organization to quickly adopt and adapt the frameworks and models (NIST-CSF, NIST Privacy Framework, CMMC, etc.) that may be required to address internal, external (regulatory) and cyber threat landscape changes. The DVMS enables enterprises to become adaptive, cyber-resilient organizations capable of creating, protecting, and delivering trusted digital business value to their stakeholders.

NCSP Foundation Certification Training
Delivered OnlineFlexible Dates
£995 to £2,195

NCSP Digital Business Risk Awareness Training

By IIL Europe Ltd

Accredited through APMG International, certified in the UK by the National Cyber Security Centre (NCSC) and listed as qualified cyber training by Department of Homeland Security Cybersecurity and Infrastructure Security Agency (DHS CISA) in the USA, the NIST Cyber Security Professional (NCSP®) training program teaches individuals and organizations how to engineer, operationalize, and continually improve a NIST Cybersecurity Framework program. This introductory level, non-examinable NCSP® Digital Business Risk Awareness Certificate course takes learners on a journey to understand how the ever-changing cyber threat landscape impacts an organization's ability to secure the value of its digital business services. The course will allow participants to apply what they learn in a real-world environment.

NCSP Digital Business Risk Awareness Training
Delivered OnlineFlexible Dates
£200 to £695

NIST Cyber Security Professional (NCSP) Practitioner

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course assumes the student has successfully taken and passed the NCSF Foundation 2.0 course based on the NIST Cybersecurity Framework version 1.1, release April 2018. Following the course introduction, the course provides an introduction to the intersection between digital transformation and cybersecurity, which is followed by an overview of the threat landscape. Following an approach to the implementation of cybersecurity controls, the course delves into an organizational approach to cybersecurity that starts governance, management, and a supportive culture,Finally, the course provides additional guidance for the cybersecurity practitioner to determine the current state, the desired state, and a plan to close the gap - and to do this over and over again to inculcate it into organizational DNA. Overview This course looks at the impact of digital transformation on cybersecurity risks, an understanding of the threat landscape, and an approach to the application of cybersecurity controls. It provides guidance for students on the best approach to design and build a comprehensive cybersecurity program. Executives are keenly aware of the risks but have limited knowledge on the best way to mitigate these risks. This course also enables our executives to answer the critical question - Are we secure? The class includes lectures, informative supplemental reference materials, quizzes, exercises, and formal examination. The exercises are a critical aspect of the course; do not skip them. Outcomes and benefits from this class is a practical approach that students can use to build and maintain comprehensive cybersecurity and cyber-risk management programs. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explores what the Practitioner needs to know about the relationship between digital transformation and cybersecurity Explain how to determine the impact of cybersecurity on DX. Explain the relationships between culture and digital transformation from the perspective of a practitioner. Explain the delivery of value to stakeholders in a DX & cybersecurity environment. Illustrate the interdependent relationship between cybersecurity and DX. Threat Landscape The Practitioner needs to understand what threat actors do and their capabilities. Compare the evolving attack type impact to the threat environment. Apply knowledge about the threat landscape to maintain a readiness to respond. Develop a risk profile based on business impact analysis Establish the relationship between awareness and training in the continual improvement of cybersecurity posture. Develop and treat training & awareness as a critical aspect of deterrence Use knowledge about the threat landscape as a predicate to the adoption and adaptation of your cybersecurity posture. The Controls This chapter provides a sample set of controls based on an informative reference. Understand the purpose goals & objectives for each control. Characterize & explain the informative reference controls Discover how to apply the controls in an organizational context. Adopt & Adapt Adopt is a decision about governance; adapt is the set of management decisions that result from the decision to adopt. Distinguish Adopt, Adapt, Management & Governance. Develop an approach to adoption & adaptation. Distinguish & demonstrate the impact of organizational culture on developing cybersecurity as a capability. Develop an assessment approach to define current state. Adaptive Way of Working Threat actors are agile and highly adaptive. The cybersecurity Practitioner must develop the same capabilities Break down what constitutes an adaptive approach. Characterize & apply the need for crossfunctional teams. Recognize and prioritize the first steps (get started). Demonstrate & establish cybersecurity phases. Break down the impact of the flows. Rapid Adoption & Rapid Adaptation FastTrack FastTrack? is an approach to allow organizations to learn to adapt to an evolving threat landscape rapidly. Approach: Establish what it takes to adopt CS. Determine how that impacts management adaptation of CS. Determine how that impacts the capability to assess. CS Capability: Determine the gap between existing & needed capabilities. Establish what must be developed. Develop appropriate risk management profile. Discover how cybersecurity impacts people, practice & technology impacts organization. Differentiate CIS Implementation groups. Determine appropriate implementation group & approach. Develop appropriate phase approaches. CIIS Practice Cybersecurity is an ongoing game of cat and mouse. Organizations must learn how to inculcate cybersecurity improvement into their DNA. Break down & develop mechanisms for ongoing cybersecurity improvement that includes developing a learning organization. Illustrate an improvement plan based on the NIST 7-Step Approach. Illustrate an improvement plan based on the Improvement GPS Demonstrate understanding of Cybersecurity Maturity Model Certification Break down the balancing loop & how it fits into the escalation archetype Use the Fast Track? (improvement & implementation) cycles.

NIST Cyber Security Professional (NCSP) Practitioner
Delivered OnlineFlexible Dates
Price on Enquiry

NIST Cyber Security Professional (NCSP) Foundation

By Nexus Human

Duration 1 Days 6 CPD hours Overview The purpose of this document is to provide the learning outcomes for the course and the assessment criteria. It also provides an overview of the examination design in terms of the types of questions asked.Starting with Chapter 2, Digital Transformation, the BL 1 & 2 (for Bloom's Taxonomy 1 & 2) provides the number of questions that will appear on the exam. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explain what it means to ?become digital.? Discuss the difference between industrial and digital era enterprises. Explain how cybersecurity supports an organization?s digital transformation. Understanding cyber Risks Explain the cyber risk equation. Identify and explain each component of the cyber risk equation. Describe the basics of a risk assessment. NIST Cybersecurity Framework Fundamentals9 Explain the genesis of the NIST-CSF. List and describe the components of the NIST-CSF. Describe each of the NIST-CSF?s objectives. Core Functions, Categories & Subcategories Understand and explain the a.Core Functions b.Framework Categories c.Informative References. Implementation Tiers & Profiles Understand and explain Implementation Tier terms and their use. Understand and explain each Implementation Tier. Understand and describe the three risk categories Understand and explain Profiles and their use a.Current b.Target Understand and describe the use of Profiles when a.Determining gaps b.Identify & prioritize focus areas Cybersecurity Improvement Understand and explain how an organization can approach the adoption and adaptation of the NIST-CSF Understand and describe how to implement cybersecurity controls using an incremental improvement approach. Understand and describe CIIS as a practice within an organization.

NIST Cyber Security Professional (NCSP) Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Cisco Networks with Snort Rule Writing Best Practices v2.1 (SSFRULES)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for technical professionals to gain skills in writing rules for Snort-based Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). The primary audience includes: Security administrators Security consultants Network administrators System engineers Technical support personnel using open source IDS and IPS Channel partners and resellers Overview After taking this course, you should be able to: Describe the Snort rule development process Describe the Snort basic rule syntax and usage Describe how traffic is processed by Snort Describe several advanced rule options used by Snort Describe OpenAppID features and functionality Describe how to monitor the performance of Snort and how to tune rules The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.1 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules. Course Outline Introduction to Snort Rule Development Snort Rule Syntax and Usage Traffic Flow Through Snort Rules Advanced Rule Options OpenAppID Detection Tuning Snort

Cisco Securing Cisco Networks with Snort Rule Writing Best Practices v2.1 (SSFRULES)
Delivered OnlineFlexible Dates
Price on Enquiry

NCSP 800-53 Practitioner Certification Training

By IIL Europe Ltd

The NCSP® 800-53 Practitioner accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the NIST Cybersecurity Framework and its 800-53 controls across an enterprise and its supply chain.The course also teaches candidates how to build a Digital Value Management System (DVMS) CPD overlay model capable of enabling the quick adoption and adaption of new frameworks and models (NIST-CSF, NIST Privacy Framework, CMMC, etc.) that may be required to address internal, external (regulatory), and cyber threat landscape changes. Finally, the course teaches candidates how to ensure the organization's DVMS is designed for use within the organization and auditable by government regulators looking to verify regulatory outcomes. The NCSP Practitioner 800-53 course is designed for both the Implementer and Auditor topics and participants select the exam they want to take (or an additional exam can be ordered to be certified as both an implementer and auditor).

NCSP 800-53 Practitioner Certification Training
Delivered OnlineFlexible Dates
£2,995 to £3,995

Elite Cybersecurity Training: From Threat Detection to Attack Prevention

5.0(1)

By LearnDrive UK

“Empower yourself with our Cybersecurity: Understand Threats and Prevent Attacks course. Gain vital insights into cybersecurity threats and effective prevention strategies to safeguard your digital assets.”

Elite Cybersecurity Training: From Threat Detection to Attack Prevention
Delivered Online On Demand1 hour
£5

90-Minute Crash Course in Cybersecurity Management

5.0(1)

By LearnDrive UK

Empower yourself with critical cybersecurity knowledge in just 90 minutes. From securing passwords to encryption, this course covers essential security measures for protecting digital and physical assets. Ideal for anyone keen on safeguarding their cyber presence.

90-Minute Crash Course in Cybersecurity Management
Delivered Online On Demand1 hour
£5

Educators matching "NIST Cybersecurity Framework (CSF)"

Show all 5
LearnDrive UK

learndrive uk

4.0(2)

Ashford

WELCOME TO LEARNDRIVE! YOUR TRUSTED ONLINE LEARNING PLATFORM! We Learndrive, are on a mission to provide easily accessible quality education and training for everyone around the world. As an online training provider, we strive to provide courses to help our learners achieve their academic and career goals. Learndrive offers a wide range of courses that are tailored to make them useful to individuals who are willing to learn. We are constantly working on delivering new and on-demand courses for our learners.   OUR MISSION & VISION The 4th industrial revolution is currently happening. Our mission at Learndrive is to empower organisations and individual employees so that they can adapt to this new way of living. We do so by providing flexible, effective skills training.  Here at Learndrive, we believe in expertise. Rather than providing shallow materials,  we provide a sophisticated platform on which the real subject experts can share knowledge with you- the learners. We provide premium learning materials so you can land your dream job. Learndrive has a clear mission; that is to get you ready for the new tech-based industrial era. The need for career advancement in this era goes far beyond mere training. Gaining in-depth subject knowledge is essential to unlocking your career goals. For this reason, we have a team that constantly works on producing premium learning materials.  Achieving our vision requires us to go to the experts in their relevant fields. With expert-written learning materials at Learndrive, you can enhance your credibility and boost your earning potential.  We want to help you reach the top of your career. The thousands of courses we offer are tailored by professionals in different fields so that you can easily grasp the concepts and apply them in real-world scenarios.  Our courses are based on industry-relevant curriculum with audio and video modules. We also offer assignments that test your learning and hone your skills. We also aid our learners to adapt to the updated industry compliance and practices. We offer our courses to students from the UK and all over the world. The focus of our organisation is to make you ready for the new industrial era. We offer our best to you without regard to race, language, or nationality.

IIL Europe Ltd

iil europe ltd

London

At IIL, our fundamental values of Intelligence, Integrity, and Innovation guide our actions and achievements with each customer, partner, and colleague. Our deepest purpose is to foster the growth and success of individuals, teams, and organizations through enduring relationships and top-notch learning content delivered through various methods. Explore our learning categories: NEW Generative Artificial Intelligence Agile and Scrum Business Analysis Business Relationship Management Cybersecurity IT Management Lean Six Sigma Microsoft Project Project, Program and Portfolio Management INNOVATION IN PROFESSIONAL DEVELOPMENT & TRAINING IIL offers a wide variety of delivery methods to ensure an optimal learning experience. Using its proprietary Many Methods of Learning™, IIL delivers innovative, effective and consistent training solutions through a variety of learning approaches: * In-Person Classroom Courses * Self-Paced On-Demand Training * Live Virtual Classes * Simulations * Free Videos & Webinars * Mobile IIL ACCREDITING BODIES AND PARTNERSHIPS IIL is a PMI® Charter Global Registered Education Provider and member of PMI’s Global Executive Council as well as a Microsoft Partner (with a Microsoft Gold Project and Portfolio Management competency), IIL is also an Accredited Training Partner for: * PRINCE2 * ITIL * Association for Project Management (APM) * PeopleCert on behalf of AXELOS * IASSC Accredited Training Organization® * The American Council on Education (ACE), an APMG International Accredited Training Organization (ATO) * Scrum Alliance REA organization * Authorized CEU Sponsor Member of the International Association for Continuing Education and Training (IACET). * IIBA® Endorsed Education Provider. IIL is the training solution partner of choice for many top global companies.  * Women’s Business Enterprise National Council (WBENC) corporate member.

Nexus Human

nexus human

London

Nexus Human, established over 20 years ago, stands as a pillar of excellence in the realm of IT and Business Skills Training and education in Ireland and the UK.  For over two decades, Nexus Human has been a steadfast source of reliable and high-quality training solutions, catering to a diverse range of professional and educational needs. With a strong reputation in the Training Industry, Nexus Human has consistently demonstrated its commitment to equipping individuals and organisations with the skills and knowledge required to thrive in today's dynamic world.  Our training programs span a wide spectrum, encompassing IT certifications, business skills, and much more.   What sets Nexus Human apart is our unwavering dedication to staying at the forefront of industry trends and technology advancements.  Our expert instructors, coupled with cutting-edge training resources, ensure that students receive the most up-to-date and relevant knowledge available. The impact of Nexus Human extends far and wide, helping individuals enhance their career prospects and aiding businesses in achieving their goals.  This 20-year journey has solidified our institution's standing as a trusted partner in personal and professional growth, offering reliable, excellent training that continues to shape the future.  Whether you seek to upskill, reskill, or simply stay ahead of the curve, Nexus Human is the place to turn for an educational experience marked by quality, reliability, and innovation.