Cybersecurity Program Pro: Build & Implement in 2024
Focused View
4:21:10
1 - Welcome.mp4
01:01
2 - How to Navigate This Course.mp4
03:26
3 - Course Overview.mp4
08:07
4 - Syllabus.html
5 - Meet Your Instructor.html
6 - Module Intro.mp4
00:46
7 - What is a Cybersecurity Program.mp4
07:19
8 - Why have a Cybersecurity Program.mp4
06:56
9 - How does a Security Program Mitigate Risk.mp4
04:33
10 - Security Program Operations.mp4
09:36
11 - Cybersecurity Frameworks.mp4
01:34
12 - Core Cybersecurity Concepts.mp4
05:55
13 - Module Intro.mp4
00:56
14 - Payoff Model.mp4
03:36
15 - Choosing an Implementation Approach.mp4
02:45
16 - Change Management.mp4
02:11
17 - Module Intro.mp4
01:48
18 - The Basics.mp4
07:09
19 - Requirements.mp4
06:03
20 - Module Intro.mp4
02:32
21 - Laws and Regulations Overview.mp4
04:12
22 - Common Regulatory Components.mp4
11:15
23 - General Data Protection Regulation GDPR.mp4
04:04
24 - California Consumer Privacy Act CCPA.mp4
04:02
25 - Payment Card Industry Data Security Standard PCI DSS.mp4
03:42
26 - SarbanesOsxley Act SOX.mp4
04:34
27 - Health Insurance Portability and Accountability Act HIPAA.mp4
01:31
28 - Cybersecurity Maturity Model Certification CMMC.mp4
02:48
29 - GrammLeachBliley Act GLBA.mp4
01:53
30 - Childrens Online Privacy Protection Act COPPA.mp4
01:41
31 - Family Educational Rights and Privacy Act FERPA.mp4
02:57
32 - Module Intro.mp4
01:02
33 - Written Information Security Plan WISP.mp4
02:25
34 - Acceptable Use Policy AUP.mp4
01:59
35 - Password Policy.mp4
02:11
36 - Privacy Policy.mp4
01:44
37 - Service Level Agreements SLA.mp4
04:13
38 - OperationalLevel Agreement.mp4
02:48
39 - PrivacyLevel Agreement.mp4
01:54
40 - Terms of Service ToS.mp4
01:12
41 - Data Retention Policy.mp4
01:29
42 - Master Service Agreements MSA.mp4
03:25
43 - Statement of Work SoW.mp4
02:51
44 - NonDisclosure Agreements NDA.mp4
01:51
45 - Memorandum of Understanding MOU.mp4
02:15
46 - Interconnect Security Agreement ISA.mp4
02:23
47 - Module Intro.mp4
03:55
48 - Compliance Management.mp4
01:55
49 - Risk Management.mp4
05:12
50 - Asset Acquisition and Management.mp4
02:32
51 - Vulnerability Management.mp4
06:08
52 - Patch Management.mp4
02:58
53 - Vendor and Supply Chain Management.mp4
05:07
54 - Personnel Management.mp4
02:29
55 - Identity and Access Management IAM.mp4
01:05
56 - Security Awareness Training Management.mp4
01:58
57 - Change Management.mp4
01:55
58 - Data Management.mp4
01:07
59 - Monitoring and Alerting.mp4
03:16
60 - Incident Management.mp4
02:36
61 - Contingency Planning.mp4
02:17
62 - Auditing and Assessments.mp4
02:02
63 - Program Management.mp4
01:21
64 - Module Intro.mp4
01:18
65 - Determining Risk Tolerance.mp4
04:20
66 - Risk Assessment.mp4
02:21
67 - Asset Risk Assessment.mp4
03:23
68 - DEMO Asset Inventory and Assessment.mp4
08:45
69 - Identify Solutions and ROI.mp4
04:39
70 - DEMO Solutions and ROI.mp4
05:54
71 - Prioritizing Work.mp4
05:39
72 - Module Intro.mp4
02:18
73 - Start with a Framework.mp4
08:02
74 - Implementing a Framework.mp4
05:24
75 - Determining Work.mp4
01:23
76 - Review.mp4
04:18
77 - Course Wrap up.mp4
02:59
More details
Course Overview
This comprehensive course provides a step-by-step framework for developing and implementing an effective cybersecurity program tailored to your organization's needs and risk profile.
What You'll Learn
- Core components of a cybersecurity program
- How to conduct risk assessments and determine ROI
- Implementation strategies for compliance frameworks
Who This Is For
- Small/medium business owners
- IT professionals implementing security
- Compliance and risk management staff
Key Benefits
- No prior cybersecurity experience needed
- Covers major compliance regulations (GDPR, HIPAA, PCI)
- Practical implementation frameworks
Curriculum Highlights
- Cybersecurity Program Fundamentals
- Regulatory Compliance Requirements
- Risk Assessment & Implementation
Focused display
Category
- language english
- Training sessions 75
- duration 4:21:10
- Release Date 2025/04/26