Scroll to top button

Developing Cybersecurity Programs and Policies

ISBN : 9781644590065

Learn about developing cybersecurity policies with the Developing Cybersecurity Programs and Policies course. The course covers all the concepts related to cybersecurity programs and policies along with the topics such as cybersecurity frameworks, governance, risk management, human resources security, physical and environmental security; PCI compliance for merchants, and many more. The course offers the best practices to define governance and policy; ensure its compliance, and collaborate to strengthen the whole organization.

Glossary of terms
Pre Assessment Questions
Post Assessment Questions
  • Information Security vs. Cybersecurity Policies
  • Looking at Policy Through the Ages
  • Cybersecurity Policy
  • Cybersecurity Policy Life Cycle
  • Summary
  • Policy Hierarchy
  • Writing Style and Technique
  • Policy Format
  • Summary
  • Confidentiality, Integrity, and Availability
  • NIST's Cybersecurity Framework
  • Summary
  • Understanding Cybersecurity Policies
  • Cybersecurity Risk
  • Summary
  • Information Assets and Systems
  • Information Classification
  • Labeling and Handling Standards
  • Information Systems Inventory
  • Understanding Data Loss Prevention Technologies
  • Summary
  • The Employee Life Cycle
  • The Importance of Employee Agreements
  • The Importance of Security Education and Training
  • Summary
  • Understanding the Secure Facility Layered Defense Model
  • Protecting Equipment
  • Summary
  • Standard Operating Procedures
  • Operational Change Control
  • Malware Protection
  • Data Replication
  • Secure Messaging
  • Activity Monitoring and Log Analysis
  • Service Provider Oversight
  • Threat Intelligence and Information Sharing
  • Summary
  • Access Control Fundamentals
  • Infrastructure Access Controls
  • User Access Controls
  • Summary
  • System Security Requirements
  • Secure Code
  • Cryptography
  • Summary
  • Incident Response
  • What Happened? Investigation and Evidence Handling
  • Data Breach Notification Requirements
  • Summary
  • Emergency Preparedness
  • Business Continuity Risk Management
  • The Business Continuity Plan
  • Plan Testing and Maintenance
  • Summary
  • The Gramm-Leach-Bliley Act
  • New York's Department of Financial Services Cybersecurity Regulation (23 NYCRR Part 500)
  • What Is a Regulatory Examination?
  • Personal and Corporate Identity Theft
  • Summary
  • The HIPAA Security Rule
  • The HITECH Act and the Omnibus Rule
  • Understanding the HIPAA Compliance Enforcement Process
  • Summary
  • Protecting Cardholder Data
  • PCI Compliance
  • Summary
  • Introducing the NIST Cybersecurity Framework Components
  • The Framework Core
  • Framework Implementation Tiers ("Tiers")
  • NIST's Recommended Steps to Establish or Improve a Cybersecurity Program
  • NIST's Cybersecurity Framework Reference Tool
  • Adopting the NIST Cybersecurity Framework in Real Life
  • Summary