Home Search Profile

Cybersecurity Program Pro: Build & Implement in 2024

Focused View

4:21:10

  • 1 - Welcome.mp4
    01:01
  • 2 - How to Navigate This Course.mp4
    03:26
  • 3 - Course Overview.mp4
    08:07
  • 4 - Syllabus.html
  • 5 - Meet Your Instructor.html
  • 6 - Module Intro.mp4
    00:46
  • 7 - What is a Cybersecurity Program.mp4
    07:19
  • 8 - Why have a Cybersecurity Program.mp4
    06:56
  • 9 - How does a Security Program Mitigate Risk.mp4
    04:33
  • 10 - Security Program Operations.mp4
    09:36
  • 11 - Cybersecurity Frameworks.mp4
    01:34
  • 12 - Core Cybersecurity Concepts.mp4
    05:55
  • 13 - Module Intro.mp4
    00:56
  • 14 - Payoff Model.mp4
    03:36
  • 15 - Choosing an Implementation Approach.mp4
    02:45
  • 16 - Change Management.mp4
    02:11
  • 17 - Module Intro.mp4
    01:48
  • 18 - The Basics.mp4
    07:09
  • 19 - Requirements.mp4
    06:03
  • 20 - Module Intro.mp4
    02:32
  • 21 - Laws and Regulations Overview.mp4
    04:12
  • 22 - Common Regulatory Components.mp4
    11:15
  • 23 - General Data Protection Regulation GDPR.mp4
    04:04
  • 24 - California Consumer Privacy Act CCPA.mp4
    04:02
  • 25 - Payment Card Industry Data Security Standard PCI DSS.mp4
    03:42
  • 26 - SarbanesOsxley Act SOX.mp4
    04:34
  • 27 - Health Insurance Portability and Accountability Act HIPAA.mp4
    01:31
  • 28 - Cybersecurity Maturity Model Certification CMMC.mp4
    02:48
  • 29 - GrammLeachBliley Act GLBA.mp4
    01:53
  • 30 - Childrens Online Privacy Protection Act COPPA.mp4
    01:41
  • 31 - Family Educational Rights and Privacy Act FERPA.mp4
    02:57
  • 32 - Module Intro.mp4
    01:02
  • 33 - Written Information Security Plan WISP.mp4
    02:25
  • 34 - Acceptable Use Policy AUP.mp4
    01:59
  • 35 - Password Policy.mp4
    02:11
  • 36 - Privacy Policy.mp4
    01:44
  • 37 - Service Level Agreements SLA.mp4
    04:13
  • 38 - OperationalLevel Agreement.mp4
    02:48
  • 39 - PrivacyLevel Agreement.mp4
    01:54
  • 40 - Terms of Service ToS.mp4
    01:12
  • 41 - Data Retention Policy.mp4
    01:29
  • 42 - Master Service Agreements MSA.mp4
    03:25
  • 43 - Statement of Work SoW.mp4
    02:51
  • 44 - NonDisclosure Agreements NDA.mp4
    01:51
  • 45 - Memorandum of Understanding MOU.mp4
    02:15
  • 46 - Interconnect Security Agreement ISA.mp4
    02:23
  • 47 - Module Intro.mp4
    03:55
  • 48 - Compliance Management.mp4
    01:55
  • 49 - Risk Management.mp4
    05:12
  • 50 - Asset Acquisition and Management.mp4
    02:32
  • 51 - Vulnerability Management.mp4
    06:08
  • 52 - Patch Management.mp4
    02:58
  • 53 - Vendor and Supply Chain Management.mp4
    05:07
  • 54 - Personnel Management.mp4
    02:29
  • 55 - Identity and Access Management IAM.mp4
    01:05
  • 56 - Security Awareness Training Management.mp4
    01:58
  • 57 - Change Management.mp4
    01:55
  • 58 - Data Management.mp4
    01:07
  • 59 - Monitoring and Alerting.mp4
    03:16
  • 60 - Incident Management.mp4
    02:36
  • 61 - Contingency Planning.mp4
    02:17
  • 62 - Auditing and Assessments.mp4
    02:02
  • 63 - Program Management.mp4
    01:21
  • 64 - Module Intro.mp4
    01:18
  • 65 - Determining Risk Tolerance.mp4
    04:20
  • 66 - Risk Assessment.mp4
    02:21
  • 67 - Asset Risk Assessment.mp4
    03:23
  • 68 - DEMO Asset Inventory and Assessment.mp4
    08:45
  • 69 - Identify Solutions and ROI.mp4
    04:39
  • 70 - DEMO Solutions and ROI.mp4
    05:54
  • 71 - Prioritizing Work.mp4
    05:39
  • 72 - Module Intro.mp4
    02:18
  • 73 - Start with a Framework.mp4
    08:02
  • 74 - Implementing a Framework.mp4
    05:24
  • 75 - Determining Work.mp4
    01:23
  • 76 - Review.mp4
    04:18
  • 77 - Course Wrap up.mp4
    02:59
  • More details


    Course Overview

    This comprehensive course provides a step-by-step framework for developing and implementing an effective cybersecurity program tailored to your organization's needs and risk profile.

    What You'll Learn

    • Core components of a cybersecurity program
    • How to conduct risk assessments and determine ROI
    • Implementation strategies for compliance frameworks

    Who This Is For

    • Small/medium business owners
    • IT professionals implementing security
    • Compliance and risk management staff

    Key Benefits

    • No prior cybersecurity experience needed
    • Covers major compliance regulations (GDPR, HIPAA, PCI)
    • Practical implementation frameworks

    Curriculum Highlights

    1. Cybersecurity Program Fundamentals
    2. Regulatory Compliance Requirements
    3. Risk Assessment & Implementation
    Focused display
    Category
    • language english
    • Training sessions 75
    • duration 4:21:10
    • Release Date 2025/04/26