Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Security for the SMB: Implementing the NIST Cybersecurity Framework
Description
Learn how to secure the assets, systems, and networks of small and medium business (SMB) using the NIST Cybersecurity Framework.
Tags
Syllabus
Introduction
- Secure your infrastructure with NIST
- Understanding and managing your risks
- Cybersecurity threats and vulnerabilities
- Cybersecurity requirements
- NIST Cybersecurity Framework
- Cybersecurity five-step process overview
- Building a cybersecurity program
- Inventory of critical assets
- Business impact assessment
- Security policies and procedures
- I-AAA
- Overview of defending business assets
- Network defenses
- System security
- Encryption
- Personnel and physical security
- Detecting security issues overview
- System auditing and logging
- Monitoring and alerting
- Assessments and audits
- Establishing a response plan
- Incident response plan examples
- Digital forensics
- Response testing and training
- Your continuity of operations plan
- Backups, virtualization, and the cloud
- Best practices
- Resources
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/0f3cb0284907.jpeg)
Security for the SMB: Implementing the NIST Cybersecurity Framework
Affiliate notice
-
TypeOnline Course
-
Provider
Learn how to secure the assets, systems, and networks of small and medium business (SMB) using the NIST Cybersecurity Framework.
Introduction
- Secure your infrastructure with NIST
- Understanding and managing your risks
- Cybersecurity threats and vulnerabilities
- Cybersecurity requirements
- NIST Cybersecurity Framework
- Cybersecurity five-step process overview
- Building a cybersecurity program
- Inventory of critical assets
- Business impact assessment
- Security policies and procedures
- I-AAA
- Overview of defending business assets
- Network defenses
- System security
- Encryption
- Personnel and physical security
- Detecting security issues overview
- System auditing and logging
- Monitoring and alerting
- Assessments and audits
- Establishing a response plan
- Incident response plan examples
- Digital forensics
- Response testing and training
- Your continuity of operations plan
- Backups, virtualization, and the cloud
- Best practices
- Resources
Tags
Loading...
Saving...
Loading...