Developing Cybersecurity Programs and Policies

(pearson-dev-cysec) / ISBN : 9781644590065

This course includes
Mentoring (Add-on)

Use Developing Cybersecurity Programs and Policies course to learn cybersecurity online. This cybersecurity training course covers all the concepts such as cybersecurity frameworks, governance, risk management, human resources security, physical and environmental security; PCI compliance for merchants, and many more. The course offers the best practices to define governance and policy; ensure its compliance, and collaborate to strengthen the whole organization.


18+ Lessons | 418+ Quizzes | 122+ Flashcards | 122+ Glossary of terms


100+ Pre Assessment Questions | 100+ Post Assessment Questions |

Here's what you will learn

Download Course Outline

  • Information Security vs. Cybersecurity Policies
  • Looking at Policy Through the Ages
  • Cybersecurity Policy
  • Cybersecurity Policy Life Cycle
  • Summary

  • Policy Hierarchy
  • Writing Style and Technique
  • Policy Format
  • Summary

  • Confidentiality, Integrity, and Availability
  • NIST's Cybersecurity Framework
  • Summary

  • Understanding Cybersecurity Policies
  • Cybersecurity Risk
  • Summary

  • Information Assets and Systems
  • Information Classification
  • Labeling and Handling Standards
  • Information Systems Inventory
  • Understanding Data Loss Prevention Technologies
  • Summary

  • The Employee Life Cycle
  • The Importance of Employee Agreements
  • The Importance of Security Education and Training
  • Summary

  • Understanding the Secure Facility Layered Defense Model
  • Protecting Equipment
  • Summary

  • Standard Operating Procedures
  • Operational Change Control
  • Malware Protection
  • Data Replication
  • Secure Messaging
  • Activity Monitoring and Log Analysis
  • Service Provider Oversight
  • Threat Intelligence and Information Sharing
  • Summary

  • Access Control Fundamentals
  • Infrastructure Access Controls
  • User Access Controls
  • Summary

  • System Security Requirements
  • Secure Code
  • Cryptography
  • Summary

  • Incident Response
  • What Happened? Investigation and Evidence Handling
  • Data Breach Notification Requirements
  • Summary

  • Emergency Preparedness
  • Business Continuity Risk Management
  • The Business Continuity Plan
  • Plan Testing and Maintenance
  • Summary

  • The Gramm-Leach-Bliley Act
  • New York's Department of Financial Services Cybersecurity Regulation (23 NYCRR Part 500)
  • What Is a Regulatory Examination?
  • Personal and Corporate Identity Theft
  • Summary

  • The HIPAA Security Rule
  • The HITECH Act and the Omnibus Rule
  • Understanding the HIPAA Compliance Enforcement Process
  • Summary

  • Protecting Cardholder Data
  • PCI Compliance
  • Summary

  • Introducing the NIST Cybersecurity Framework Components
  • The Framework Core
  • Framework Implementation Tiers ("Tiers")
  • NIST's Recommended Steps to Establish or Improve a Cybersecurity Program
  • NIST's Cybersecurity Framework Reference Tool
  • Adopting the NIST Cybersecurity Framework in Real Life
  • Summary

Customer Review

As an expert reviewer of the uCertify Developing Cybersecurity Programs and Policies course curriculum, I’ve found that it provides a thorough overview of professional learning topics and resources required for developing a cybersecurity strategy within an organization.