Implementing the NIST Cybersecurity Framework Using COBIT 5

Course Overview

You will learn how to manage cybersecurity risks utilizing the NIST Cybersecurity Framework and COBIT 5 in this course and the context and nature of cybersecurity risks. This course also covers ISO/IEC 27000. Therefore, this course will be helpful to if you already use that standard or are interested in adopting it as a general IT Security Management System.

Prerequisites

Before attending this accelerated course, you must possess the following certification:

  • The COBIT 5 Foundation certification

Audience Profile

This course and exam are designed for people who are active in enhancing the cybersecurity programme for either their own company or external companies and have a fundamental understanding of both COBIT 5 and security concepts.

Learning Objectives

By Completing this course, participants will be able to:

  • Understanding the course objectives and content, exam requirements and learning approach.
  • Understanding the context of cybersecurity: the risks, the challenges in managing these risks, & the benefits of aligning the NIST Framework, ISO/IEC 27000 & COBIT 5.
  • Understanding an overview of the NIST Cybersecurity Framework, COBIT 5, and ISO/IEC 27000.
  • Understanding the objectives & scope of the ISACA Guide & how to employ it to carry out Step 1: Prioritise & Scope.
  • Understanding how to use the ISACA Guide & to implement Step 2: Orient & Step 3: Create a Current Profile.
  • Understanding how to use the ISACA Guide & to implement Step 4: Conduct a Risk Assessment & Step 5 – Create a Target Profile.
  • Understanding how to use the ISACA Guide & to implement Step 6: Determine, Analyse & Prioritise Gaps.
  • Understanding how to use the ISACA Guide and to implement Step 7 – Implementation Plan.
  • Understanding how to use the ISACA Guide & to implement an Action Plan Review & Manage the Lifecycle.

Content Outline

  • Introduction
  • Course Objective
  • Agenda
  • Learning Approach
  • Cybersecurity Challenges
  • What is cybersecurity?
  • What are the different risks?
  • What are the different challenges?
  • What are the different benefits:
    • NIST Framework
    • COBIT 5
    • ISO27000
  • NIST Core, Tier & Profiles Facts & concepts
  • How to apply these concepts to a scenarios.
  • The CSF Goals & implementation steps
  • Relationship between the CSF and the NIST Framework
  • What are the drivers?
  • Implementation Considerations
  • COBIT 5 Practices That Are Relevant
  • Where are we now?
  • Implementation Considerations
  • COBIT 5 Practices That Are Relevant
  • Where do we want to be?
  • Implementation Considerations
  • COBIT 5 Practices That Are Relevant
  • What needs to be done?
  • Implementation Considerations
  • COBIT 5 Practices That Are Relevant
  • How do we get there?
  • Implementation Considerations
  • COBIT 5 Practices That Are Relevant
  • COBIT 5 Practices That Are Relevant
  • Did we Get There
  • Implementation Considerations
  • How do we Keep the Momentum Going

FAQs

Control Objectives for Information & Related Technology, or COBIT, is an abbreviation. This framework for IT governance and management was developed by ISACA. 

It is utilised by those who are in charge of specific commercial and technological operations. The information must be trustworthy and pertinent, and it must also have some level of quality and technological and informational control.

The process used by COBIT divides the IT into 4 main domains and there are 34 processes involved which are responsible for the planning, building, running, and monitoring. It has been placed at a level and been harmonized and united with other good practices like ITIL, TOGAF, COSO, CMMI, etc. 

The components included in COBIT are the framework, the process descriptions, the control objectives, the management guidelines, and the maturity models. In the framework, the basic idea is to organize the good practice and governance of IT by its domains and processes and link them to the requirements of the business. In control objectives, there is a list of requirements that are to be measured by the management for efficient control of various processes of IT. The maturity models assess the maturity and the capabilities and address redressal regarding any gaps. 

A: To attend the training session you should have an operational Desktops or Laptops with required specification along with good internet connection to access the labs. 

A: We would always recommend you to attend the live session to practice & clarify the doubts instantly and get more value from your investment. However, if due to some contingency if you have to skip the class Radiant Techlearning would help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption and NOT for distribution or any commercial use.

A: Radiant Techlearning has a data center containing the Virtual Training environment for the purpose of participant’s hand-on-practice. 

Participants can easily access these labs over Cloud with the help of remote desktop connection. 

Radiant virtual labs provides you the flexibility to learn from anywhere in the world and in any time zone. 

A: The learners will be enthralled as we engage them the real world and industry Oriented projects during the training program. These projects will improve your skills and knowledge and you will gain better experience. These real time projects, they will help you a lot in your future tasks and assignments.

Send a Message.


  • Enroll