TRENDS is Quint’s Affiliate to deliver ITIL, Prince2 and ISO/IEC20000. Quint Wellington Redwood is a Global Authorized Training Organization (ATO) for ITIL®, PRINCE2® and ISO/IEC20000 Training.

Implementing the NIST standards using COBIT 5

Schedule

Start End Duration Location Details

Course Details

Implementing the NIST standards using COBIT 5

Course code: C5Imp

Duration: 2 Days


Prerequisite:

•    Basic knowledge of COBIT
•    Basic knowledge of security concepts


Course Description:

Implementing NIST Cybersecurity Framework using COBIT® 5 course provides guidance in the implementation of the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) through a seven-step process, aligned with COBIT5 principles.

This purpose of this course is focused on the Cybersecurity Framework (CSF), its goals, the implementation steps and the ability to apply this information. The course and exam are for individuals who have a basic understanding of both COBIT 5 and security concepts, and who are involved in improving the cybersecurity program for their enterprises.


Course Objectives:

After taking this course, you should be able to:

•    Understand the goals of the Cybersecurity Framework (CSF)
•    Understand and discuss the content of the CSF and what it means to align to it
•    Understand each of the seven CSF implementation steps
•    Be able to apply and evaluate the implementation steps using COBIT5

Intended Audience:

•    Individuals who have a basic understanding of both COBIT5 and security concepts, and who are involved in improving the cybersecurity program for outside organizations or their own organization.


Course Outlines:

•    Module 1: Introduction
•    Module 2: COBIT 5 Review
•    Module 3: Overview to the Cybersecurity Framework (CSF)
•    Module 4: Cybersecurity Framework (CSF) Structure
•    Module 5: Phase 1 (Step 1 Prioritize and Scope)
•    Module 6: Phase 2 (Steps 2 Create a Current Profile & Step 3 Create a Current Profile)
•    Module 7: Phase 3 (Steps 4 Conduct a Risk Assessment & Step 5 Create a Target Profile)
•    Module 8: Phase 4 (Step 6 Determine, Analyze, and Prioritize Gaps)
•    Module 9: Phase 5 (Step 7 Implement Action Plan)
•    Module 10: Phases 6 (CSF Action Plan Review) & Phase 7 (CSF Life Cycle Management)
•    Module 11: Mock exam and review
•    Exam - Implementing NIST Cybersecurity Framework Using COBIT 5