Premium Features

Previous Buy now to get complete version Next
  • Home
uCertify Logo
  • login
  • Signup
    • Help & Support
    • Accessibility
    • Testimonials
  • Powered by uCertify
  • Request Demo
  • Hello GuestLogin or Signup
  • Feedback & Support
    • Support
    • Keyboard Shortcuts
    • Send Feedback
Scroll to top button

Developing Cybersecurity Programs and Policies

(pearson-dev-cysec) / ISBN: 9781644590065
This course includes
Lessons
TestPrep
Mentoring (Add-on)
pearson-dev-cysec : Developing Cybersecurity Programs and Policies
1 Review
Try this course Pre-Assessment and first two Lessons free No credit card required
Are you an instructor? Teach using uCertify products
Request a free evaluation copy

Developing Cybersecurity Programs and Policies

Use Developing Cybersecurity Programs and Policies course to learn cybersecurity online. This cybersecurity training course covers all the concepts such as cybersecurity frameworks, governance, risk management, human resources security, physical and environmental security; PCI compliance for merchants, and many more. The course offers the best practices to define governance and policy; ensure its compliance, and collaborate to strengthen the whole organization.
Here's what you will get

Lessons
  • 18+ Lessons
  • 418+ Quizzes
  • 122+ Flashcards
  • 122+ Glossary of terms
TestPrep
  • 100+ Pre Assessment Questions
  • 100+ Post Assessment Questions
Here's what you will learn
Download Course Outline
Lesson 1: Introduction
Lesson 2: Understanding Cybersecurity Policy and Governance
  • Information Security vs. Cybersecurity Policies
  • Looking at Policy Through the Ages
  • Cybersecurity Policy
  • Cybersecurity Policy Life Cycle
  • Summary
Lesson 3: Cybersecurity Policy Organization, Format, and Styles
  • Policy Hierarchy
  • Writing Style and Technique
  • Policy Format
  • Summary
Lesson 4: Cybersecurity Framework
  • Confidentiality, Integrity, and Availability
  • NIST's Cybersecurity Framework
  • Summary
Lesson 5: Governance and Risk Management
  • Understanding Cybersecurity Policies
  • Cybersecurity Risk
  • Summary
Lesson 6: Asset Management and Data Loss Prevention
  • Information Assets and Systems
  • Information Classification
  • Labeling and Handling Standards
  • Information Systems Inventory
  • Understanding Data Loss Prevention Technologies
  • Summary
Lesson 7: Human Resources Security
  • The Employee Life Cycle
  • The Importance of Employee Agreements
  • The Importance of Security Education and Training
  • Summary
Lesson 8: Physical and Environmental Security
  • Understanding the Secure Facility Layered Defense Model
  • Protecting Equipment
  • Summary
Lesson 9: Communications and Operations Security
  • Standard Operating Procedures
  • Operational Change Control
  • Malware Protection
  • Data Replication
  • Secure Messaging
  • Activity Monitoring and Log Analysis
  • Service Provider Oversight
  • Threat Intelligence and Information Sharing
  • Summary
Lesson 10: Access Control Management
  • Access Control Fundamentals
  • Infrastructure Access Controls
  • User Access Controls
  • Summary
Lesson 11: Information Systems Acquisition, Development, and Maintenance
  • System Security Requirements
  • Secure Code
  • Cryptography
  • Summary
Lesson 12: Cybersecurity Incident Response
  • Incident Response
  • What Happened? Investigation and Evidence Handling
  • Data Breach Notification Requirements
  • Summary
Lesson 13: Business Continuity Management
  • Emergency Preparedness
  • Business Continuity Risk Management
  • The Business Continuity Plan
  • Plan Testing and Maintenance
  • Summary
Lesson 14: Regulatory Compliance for Financial Institutions
  • The Gramm-Leach-Bliley Act
  • New York's Department of Financial Services Cybersecurity Regulation (23 NYCRR Part 500)
  • What Is a Regulatory Examination?
  • Personal and Corporate Identity Theft
  • Summary
Lesson 15: Regulatory Compliance for the Health-Care Sector
  • The HIPAA Security Rule
  • The HITECH Act and the Omnibus Rule
  • Understanding the HIPAA Compliance Enforcement Process
  • Summary
Lesson 16: PCI Compliance for Merchants
  • Protecting Cardholder Data
  • PCI Compliance
  • Summary
Lesson 17: NIST Cybersecurity Framework
  • Introducing the NIST Cybersecurity Framework Components
  • The Framework Core
  • Framework Implementation Tiers ("Tiers")
  • NIST's Recommended Steps to Establish or Improve a Cybersecurity Program
  • NIST's Cybersecurity Framework Reference Tool
  • Adopting the NIST Cybersecurity Framework in Real Life
  • Summary
Appendix A: Cybersecurity Program Resources
Customer Testimonials
Zoe Braiterman
As an expert reviewer of the uCertify Developing Cybersecurity Programs and Policies course curriculum, I’ve found that it provides a thorough overview of professional learning topics and resources required for developing a cybersecurity strategy within an organization.

Show more

×
uc logo for app downloadDownload our uCertify App [lms_setting_placeholder: This filed is used to set the LMS settings.

Share with your friends and colleagues

We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. More information
Accept