Selection and Implementation of Security Controls
Selection and Implementation of Cybersecurity Risks Controls
IT and Software ,Network and Security,
Lectures -49
Resources -17
Duration -3 hours
Lifetime Access
Lifetime Access
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
This course was developed as a means of helping entry-level as well as seasoned cybersecurity professionals, to develop a more holistic rather than isolated approach to implementing controls to address cyber or information security risks. The content of this course is as follows:
SECTION 1 TOPICS
1a-Course Intro
1b-Course Intro- The Case at hand
2-About the course
3-Meet your Instructor-Mentor
4-Course Roadmap
5-Approach to Control Selection_ pt1
6-Approach to Control Selection_ pt2
7-Applying same approach to real Data Breaches at a high-level
8-Introduction to security controls
9-Key considerations for the identification- selection & implementation of controls
10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis
11-Cost Benefit Analysis associated with controls selection
12-Technology integration, Operational impact, continuous monitoring, Employee training
13-Regulatory Compliance, Incident Response Planning
SECTION 2 TOPICS
14-High-level process of selecting controls to protect eCommerce web server-Pt1
14-High-level process of selecting controls to protect eCommerce web server-Pt2
15-Steps involved in assessing the identified cyber risks in web server
16-Identify assets, identify threats, identify vulnerabilities
17-Determine likelihood, Impact, Calculate risk
18-Documenting Cybersecurity Risk Assessment Report-Pt 2
18-Documenting Cybersecurity Risk Assessment Report-Pt 1
19-The role of governance in the effective selection and implementation of cybersecurity controls
20-Why not implement frameworks that already have recommended controls
21-Challenges, considerations & disadvantages associated with implementing frameworks-Pt 1
21-Challenges, considerations & disadvantages associated with implementing frameworks-Pt 2
22-When to, versus when not to use frameworks for the selection and implementation of controls
23-Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF) Pt1
23-Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF) Pt2
24-Implementation Plan for identified controls
25- Measuring the effectiveness of implemented controls
26-Putting it all together-The Selection and Implementation of Cybersecurity Risks Controls
27-Course Recap-END
ASSIGNMENT-Research
Goals
Student will learn how to holistically apply a 360 degree approach to the selection and implementation of security risks control measures
Key considerations for the identification, selection & implementation of security controls
High-level process of selecting controls to protect\\\\\\\\ address idenitfied security risks on ecommerce web server
The role of governance in the effective selection and implementation of cybersecurity controls
Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF)
Prerequisites
Basic to advance understanding of information security principles.

Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction
14 Lectures
-
Introduction 01:54 01:54
-
1b-Course Intro-The case at hand 01:34 01:34
-
2-About the course 02:36 02:36
-
3-Meet your Instructor-Mentor 02:02 02:02
-
4-Course Roadmap 02:21 02:21
-
5-Approach to Control Selection_ pt1 01:50 01:50
-
6-Approach to Control Selection_ pt2 07:24 07:24
-
7-Applying same approach to real Data Breaches at a high-level 03:28 03:28
-
8-Introduction to security controls 07:04 07:04
-
9-Key considerations for the identification- selection & implementation of contr 08:26 08:26
-
10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis 07:39 07:39
-
11-Cost Benefit Analysis associated with controls selection 06:52 06:52
-
12- Technology integration, operational impact, continuous monitoring, employee 04:32 04:32
-
13-Regulatory Compliance, Incident Response Planning 04:51 04:51
Section 2
18 Lectures

Course Resources
17 Lectures

Instructor Details
Richea Perry
InfoSec Risks Assessment SpecialistI am Richea Perry, an experienced IT & Information Security Professional. Over the past 19 years, I've worked with businesses and organizations in the Petroleum, Education & Hospitality Industries with developing and implementing their Cybersecurity & GRC Programs, that help them in their efforts to operate securely considering the many cyber risks. Some of my acquired skills are attributed to training that I have received in, but not limited to the following certification domains:
Diploma in Teacher Education (Advanced Level)
BSc. Information Technology
OCEG-GRCP, GRCA, IPMP
ISO 27001 LA\LI
CISSP- Certified Information Systems Security Professional (Cert Prep Training)
CRISC-Certified in Risk and Information Security Control (Cert Prep Training)
CISA-Certified Information Systems Auditor (Cert Prep Training)
CISM-Certified Information Systems Manager (Cert Prep Training)
ISSEP- Information Systems Security Engineer Professional (Cert Prep Training)
Cloud Security
Course Certificate
Use your certificate to make a career change or to advance in your current career.

Our students work
with the Best


































Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now