LiveZilla Live Chat Software

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey
While System Source is working from home, we are still available for all of your calls and support needs.

NIST Cybersecurity Framework Foundation Training

SS Course: 2001285

Course Overview


This course is designed to help you understand the basics of cybersecurity, the components of the NIST CSF, and how the NIST CSF aligns to risk management.


Scheduled Classes

08/23/21 - LRS - LRS - Virtual Instructor-Led
09/21/21 - LRS - LRS - Virtual Instructor-Led

What You'll Learn



Viewing outline for:
  • Module 1 - Course Introduction
  • Module 2 - The Basics of Cybersecurity
    • What is cybersecurity?
    • Types of attackers
    • Vulnerabilities
    • Exploits
    • Threats
    • Controls
    • Frameworks
    • Risk-Based Cybersecurity
  • Module 3 - A Holistic Study of the NIST Cybersecurity Framework
    • History
      • EO 13636
      • Cybersecurity Enhancement Act of 2014
      • EO 13800
    • Uses and Benefits of the Framework
    • Attributes of the Framework
    • Framework Component Introduction
      • Framework Core
      • Framework Profiles
      • Framework Implementation Tiers
  • Module 4 - Cybersecurity Activities: The Framework Core
    • Purpose of the Core
    • Core Functions, Categories, and Subcategories
    • Informative References
  • Module 5 - Risk Management Considerations: Framework Implementation Tiers
    • Purpose of the Tiers
    • The Four Tiers
    • Components of the Tiers
    • Compare and contrast the NIST Cybersecurity Framework with the NIST Risk Management Framework
  • Module 6 - Current and Desired Outcomes: Framework Profiles
    • Purpose of the Profiles
    • The Two Profiles
    • Interrelationships between the Framework Components
  • Module 7 - A Primer on the Seven Step Framework Implementation Process
    • Prioritize and Scope
    • Orient
    • Create a Current Profile
    • Conduct a Risk Assessment
    • Create a Target Profile
    • Determine, Analyze, and Prioritize Gaps
    • Implement Action Plan



There are no prerequisites for this course. Basic computing skills and security knowledge will be helpful.

    Who Should Attend


    Security, IT, risk management, policy makers, and other business professionals who have responsibility for aspects of business or technical security can benefit from this course.

    Next Step Courses