Tutorialspoint

Celebrating 11 Years of Learning Excellence! Use: TP11

Selection and Implementation of Security Controls

person icon Richea Perry

4.6

Selection and Implementation of Security Controls

Selection and Implementation of Cybersecurity Risks Controls

updated on icon Updated on Jun, 2025

language icon Language - English

person icon Richea Perry

category icon IT and Software ,Network and Security,

Lectures -49

Resources -17

Duration -3 hours

Lifetime Access

4.6

price-loader

Lifetime Access

30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.

Course Description

This course was developed as a means of helping entry-level as well as seasoned cybersecurity professionals, to develop a more holistic rather than isolated approach to implementing controls to address cyber or information security risks. The content of this course is as follows:

SECTION 1 TOPICS

1a-Course Intro

1b-Course Intro- The Case at hand

2-About the course

3-Meet your Instructor-Mentor

4-Course Roadmap

5-Approach to Control Selection_ pt1

6-Approach to Control Selection_ pt2

7-Applying same approach to real Data Breaches at a high-level

8-Introduction to security controls

9-Key considerations for the identification- selection & implementation of controls

10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis

11-Cost Benefit Analysis associated with controls selection

12-Technology integration, Operational impact, continuous monitoring, Employee training

13-Regulatory Compliance, Incident Response Planning

SECTION 2 TOPICS

14-High-level process of selecting controls to protect eCommerce web server-Pt1

14-High-level process of selecting controls to protect eCommerce web server-Pt2

15-Steps involved in assessing the identified cyber risks in web server

16-Identify assets, identify threats, identify vulnerabilities

17-Determine likelihood, Impact, Calculate risk

18-Documenting Cybersecurity Risk Assessment Report-Pt 2

18-Documenting Cybersecurity Risk Assessment Report-Pt 1

19-The role of governance in the effective selection and implementation of cybersecurity controls

20-Why not implement frameworks that already have recommended controls

21-Challenges, considerations & disadvantages associated with implementing frameworks-Pt 1

21-Challenges, considerations & disadvantages associated with implementing frameworks-Pt 2

22-When to,  versus when not to use frameworks for the selection and implementation of controls

23-Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF) Pt1

23-Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF) Pt2

24-Implementation Plan for identified controls

25- Measuring the effectiveness of implemented controls

26-Putting it all together-The Selection and Implementation of Cybersecurity Risks Controls

27-Course Recap-END

ASSIGNMENT-Research

Goals

  • Student will learn how to holistically apply a 360 degree approach to the selection and implementation of security risks control measures

  • Key considerations for the identification, selection & implementation of security controls

  • High-level process of selecting controls to protect\\\\\\\\ address idenitfied security risks on ecommerce web server

  • The role of governance in the effective selection and implementation of cybersecurity controls

  • Selecting and implementing cybersecurity controls based on the NIST Cybersecurity Framework (CSF)

Prerequisites

  • Basic to advance understanding of information security principles.

Selection and Implementation of Security Controls

Curriculum

Check out the detailed breakdown of what’s inside the course

Introduction

14 Lectures
  • play icon Introduction 01:54 01:54
  • play icon 1b-Course Intro-The case at hand 01:34 01:34
  • play icon 2-About the course 02:36 02:36
  • play icon 3-Meet your Instructor-Mentor 02:02 02:02
  • play icon 4-Course Roadmap 02:21 02:21
  • play icon 5-Approach to Control Selection_ pt1 01:50 01:50
  • play icon 6-Approach to Control Selection_ pt2 07:24 07:24
  • play icon 7-Applying same approach to real Data Breaches at a high-level 03:28 03:28
  • play icon 8-Introduction to security controls 07:04 07:04
  • play icon 9-Key considerations for the identification- selection & implementation of contr 08:26 08:26
  • play icon 10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis 07:39 07:39
  • play icon 11-Cost Benefit Analysis associated with controls selection 06:52 06:52
  • play icon 12- Technology integration, operational impact, continuous monitoring, employee 04:32 04:32
  • play icon 13-Regulatory Compliance, Incident Response Planning 04:51 04:51

Section 2

18 Lectures
Tutorialspoint

Course Resources

17 Lectures
Tutorialspoint

Instructor Details

Richea Perry

Richea Perry

InfoSec Risks Assessment Specialist

I am Richea Perry, an experienced IT & Information Security Professional. Over the past 19 years, I've worked with businesses and organizations in the Petroleum, Education & Hospitality Industries with developing and implementing their Cybersecurity & GRC Programs, that  help them in their efforts to operate securely considering the many cyber risks. Some of my acquired skills are attributed to training that I have received in, but not limited to the following certification domains:

Diploma in Teacher Education (Advanced Level)

BSc. Information Technology

OCEG-GRCP, GRCA, IPMP

ISO 27001 LA\LI 

CISSP- Certified Information Systems Security Professional (Cert Prep Training)

CRISC-Certified in Risk and Information Security Control (Cert Prep Training) 

CISA-Certified Information Systems Auditor (Cert Prep Training)

CISM-Certified Information Systems Manager (Cert Prep Training)

ISSEP- Information Systems Security Engineer Professional (Cert Prep Training)

Cloud Security


Course Certificate

Use your certificate to make a career change or to advance in your current career.

sample Tutorialspoint certificate

Our students work
with the Best

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
Annual Membership

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
Online Certifications

Talk to us

1800-202-0515