Scroll to top button
Developing Cybersecurity Programs and Policies
(pearson-dev-cysec)
/ ISBN: 9781644590065
This course includes
Lessons
TestPrep
Developing Cybersecurity Programs and Policies
Use Developing Cybersecurity Programs and Policies course to learn cybersecurity online. This cybersecurity training course covers all the concepts such as cybersecurity frameworks, governance, risk management, human resources security, physical and environmental security; PCI compliance for merchants, and many more. The course offers the best practices to define governance and policy; ensure its compliance, and collaborate to strengthen the whole organization.
Lessons
-
18+ Lessons
-
418+ Quizzes
-
122+ Flashcards
-
122+ Glossary of terms
TestPrep
-
100+ Pre Assessment Questions
-
100+ Post Assessment Questions
- Information Security vs. Cybersecurity Policies
- Looking at Policy Through the Ages
- Cybersecurity Policy
- Cybersecurity Policy Life Cycle
- Summary
- Policy Hierarchy
- Writing Style and Technique
- Policy Format
- Summary
- Confidentiality, Integrity, and Availability
- NIST's Cybersecurity Framework
- Summary
- Understanding Cybersecurity Policies
- Cybersecurity Risk
- Summary
- Information Assets and Systems
- Information Classification
- Labeling and Handling Standards
- Information Systems Inventory
- Understanding Data Loss Prevention Technologies
- Summary
- The Employee Life Cycle
- The Importance of Employee Agreements
- The Importance of Security Education and Training
- Summary
- Understanding the Secure Facility Layered Defense Model
- Protecting Equipment
- Summary
- Standard Operating Procedures
- Operational Change Control
- Malware Protection
- Data Replication
- Secure Messaging
- Activity Monitoring and Log Analysis
- Service Provider Oversight
- Threat Intelligence and Information Sharing
- Summary
- Access Control Fundamentals
- Infrastructure Access Controls
- User Access Controls
- Summary
- System Security Requirements
- Secure Code
- Cryptography
- Summary
- Incident Response
- What Happened? Investigation and Evidence Handling
- Data Breach Notification Requirements
- Summary
- Emergency Preparedness
- Business Continuity Risk Management
- The Business Continuity Plan
- Plan Testing and Maintenance
- Summary
- The Gramm-Leach-Bliley Act
- New York's Department of Financial Services Cybersecurity Regulation (23 NYCRR Part 500)
- What Is a Regulatory Examination?
- Personal and Corporate Identity Theft
- Summary
- The HIPAA Security Rule
- The HITECH Act and the Omnibus Rule
- Understanding the HIPAA Compliance Enforcement Process
- Summary
- Protecting Cardholder Data
- PCI Compliance
- Summary
- Introducing the NIST Cybersecurity Framework Components
- The Framework Core
- Framework Implementation Tiers ("Tiers")
- NIST's Recommended Steps to Establish or Improve a Cybersecurity Program
- NIST's Cybersecurity Framework Reference Tool
- Adopting the NIST Cybersecurity Framework in Real Life
- Summary
Zoe Braiterman
As an expert reviewer of the uCertify Developing Cybersecurity Programs and Policies course curriculum, I’ve found that it provides a thorough overview of professional learning topics and resources required for developing a cybersecurity strategy within an organization.
Show more
×
Share with your friends and colleagues
We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies.
More information
Accept