Advanced Risk Management, Security Controls & Monitoring
Instructor: Packt - Course Instructors
Intermediate Level • 10 hours to complete 3 weeks at 3 hours a week • Flexible Schedule
What You'll Learn
- Analyze control frameworks to choose security controls fitting organizational needs.
- Design tailored baselines and document controls per NIST standards.
- Assess control implementations, identify gaps, and plan remediation.
- Implement continuous monitoring and manage changes for ongoing security.
Skills You'll Gain
Authorization (Computing)
Change Control
System Implementation
Security Management
Security Strategy
Risk Management Framework
System Monitoring
Security Requirements Analysis
Continuous Monitoring
Vulnerability Assessments
Risk Mitigation
Cyber Security Assessment
Security Controls
Configuration Management
NIST 800-53
Cyber Risk
Shareable Certificate
Earn a shareable certificate to add to your LinkedIn profile
Outcomes
-
Learn new concepts from industry experts
-
Gain a foundational understanding of a subject or tool
-
Develop job-relevant skills with hands-on projects
-
Earn a shareable career certificate
There are 5 modules in this course
In this module, we will explore the process of selecting appropriate security controls within the NIST Risk Management Framework. You will learn how to identify applicable rules and standards, set and tailor control baselines, allocate controls effectively, and document them for approval.
In this module, we will delve into the practical aspects of deploying security controls in cybersecurity. You will learn how to implement, evaluate, and document these controls, ensuring that they meet the necessary standards and requirements.
In this module, we will cover the entire assessment process within the NIST RMF. You will learn to plan, conduct, and document assessments, as well as to identify and remediate risks based on the findings.
In this module, we will focus on the final steps of system authorization and risk response. You will learn about the authorization process, how to document risk responses, and strategies for mitigating identified risks.
In this module, we will examine the continuous monitoring and change control processes in cybersecurity. You will learn to manage system changes, handle configuration control, and evaluate secure methods for system disposal at the end of its lifecycle.