Developing Cybersecurity Programs and Policies
(pearson-dev-cysec)
/ ISBN: 978-1-64459-006-5
This course includes
Lessons
TestPrep
Mentoring (Add-on)
Developing Cybersecurity Programs and Policies
Use Developing Cybersecurity Programs and Policies course to learn cybersecurity online. This cybersecurity training course covers all the concepts such as cybersecurity frameworks, governance, risk management, human resources security, physical and environmental security; PCI compliance for merchants, and many more. The course offers the best practices to define governance and policy; ensure its compliance, and collaborate to strengthen the whole organization.
Lessons
-
18+ Lessons
-
418+ Quizzes
-
122+ Flashcards
-
122+ Glossary of terms
TestPrep
-
100+ Pre Assessment Questions
-
100+ Post Assessment Questions
- Information Security vs. Cybersecurity Policies
- Looking at Policy Through the Ages
- Cybersecurity Policy
- Cybersecurity Policy Life Cycle
- Summary
- Policy Hierarchy
- Writing Style and Technique
- Policy Format
- Summary
- Confidentiality, Integrity, and Availability
- NIST's Cybersecurity Framework
- Summary
- Understanding Cybersecurity Policies
- Cybersecurity Risk
- Summary
- Information Assets and Systems
- Information Classification
- Labeling and Handling Standards
- Information Systems Inventory
- Understanding Data Loss Prevention Technologies
- Summary
- The Employee Life Cycle
- The Importance of Employee Agreements
- The Importance of Security Education and Training
- Summary
- Understanding the Secure Facility Layered Defense Model
- Protecting Equipment
- Summary
- Standard Operating Procedures
- Operational Change Control
- Malware Protection
- Data Replication
- Secure Messaging
- Activity Monitoring and Log Analysis
- Service Provider Oversight
- Threat Intelligence and Information Sharing
- Summary
- Access Control Fundamentals
- Infrastructure Access Controls
- User Access Controls
- Summary
- System Security Requirements
- Secure Code
- Cryptography
- Summary
- Incident Response
- What Happened? Investigation and Evidence Handling
- Data Breach Notification Requirements
- Summary
- Emergency Preparedness
- Business Continuity Risk Management
- The Business Continuity Plan
- Plan Testing and Maintenance
- Summary
- The Gramm-Leach-Bliley Act
- New York's Department of Financial Services Cybersecurity Regulation (23 NYCRR Part 500)
- What Is a Regulatory Examination?
- Personal and Corporate Identity Theft
- Summary
- The HIPAA Security Rule
- The HITECH Act and the Omnibus Rule
- Understanding the HIPAA Compliance Enforcement Process
- Summary
- Protecting Cardholder Data
- PCI Compliance
- Summary
- Introducing the NIST Cybersecurity Framework Components
- The Framework Core
- Framework Implementation Tiers ("Tiers")
- NIST's Recommended Steps to Establish or Improve a Cybersecurity Program
- NIST's Cybersecurity Framework Reference Tool
- Adopting the NIST Cybersecurity Framework in Real Life
- Summary
Zoe Braiterman
Show more
×