NIST cybersecurity and risk management frameworks:
The course kicks off with an exploration of NIST Cybersecurity and Risk Management Frameworks, offering insights into their significance in today's digital landscape. You'll delve into NIST publications, relationships, and the framework's core components, setting a strong foundation....
Saved in:
Main Authors: | , |
---|---|
Corporate Authors: | , |
Format: | Electronic Video |
Language: | English |
Published: |
[Place of publication not identified]
Packt Publishing
2024
|
Edition: | [First edition]. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781835886502/?ar |
Summary: | The course kicks off with an exploration of NIST Cybersecurity and Risk Management Frameworks, offering insights into their significance in today's digital landscape. You'll delve into NIST publications, relationships, and the framework's core components, setting a strong foundation. As the course progresses, you'll gain an in-depth understanding of NIST Cybersecurity Framework (CSF) and Risk Management Framework (RMF). Discover how to assess risks, categorize information systems, and select appropriate security controls. Learn to create System Security Plans (SSPs) and implement security controls effectively. The course wraps up by emphasizing the importance of a risk-based approach to security, highlighting the RMF preparation step, and covering topics like system authorization, risk response, and change management. What you will learn Navigate complex NIST relationships and standards Conduct risk assessments and categorization Implement security controls effectively Ensure system authorization and risk response Manage change and configuration control Handle system disposal and continuity of operations Audience This course is ideal for cybersecurity professionals and risk managers seeking expertise in NIST frameworks. Basic knowledge of cybersecurity concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts. |
Item Description: | Online resource; title from title details screen (O'Reilly, viewed January 30, 2024) |
Physical Description: | 1 Online-Ressource (1 video file (21 hr., 25 min.)) sound, color. |
ISBN: | 9781835886502 1835886507 |
Staff View
MARC
LEADER | 00000ngm a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-100859518 | ||
003 | DE-627-1 | ||
005 | 20240227122213.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 240227s2024 xx ||| |o o ||eng c | ||
020 | |a 9781835886502 |c electronic video |9 978-1-83588-650-2 | ||
020 | |a 1835886507 |c electronic video |9 1-83588-650-7 | ||
035 | |a (DE-627-1)100859518 | ||
035 | |a (DE-599)KEP100859518 | ||
035 | |a (ORHE)9781835886502 | ||
035 | |a (DE-627-1)100859518 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20240130 | |
245 | 0 | 0 | |a NIST cybersecurity and risk management frameworks |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b Packt Publishing |c 2024 | |
300 | |a 1 Online-Ressource (1 video file (21 hr., 25 min.)) |b sound, color. | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed January 30, 2024) | ||
520 | |a The course kicks off with an exploration of NIST Cybersecurity and Risk Management Frameworks, offering insights into their significance in today's digital landscape. You'll delve into NIST publications, relationships, and the framework's core components, setting a strong foundation. As the course progresses, you'll gain an in-depth understanding of NIST Cybersecurity Framework (CSF) and Risk Management Framework (RMF). Discover how to assess risks, categorize information systems, and select appropriate security controls. Learn to create System Security Plans (SSPs) and implement security controls effectively. The course wraps up by emphasizing the importance of a risk-based approach to security, highlighting the RMF preparation step, and covering topics like system authorization, risk response, and change management. What you will learn Navigate complex NIST relationships and standards Conduct risk assessments and categorization Implement security controls effectively Ensure system authorization and risk response Manage change and configuration control Handle system disposal and continuity of operations Audience This course is ideal for cybersecurity professionals and risk managers seeking expertise in NIST frameworks. Basic knowledge of cybersecurity concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Risk management | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Gestion du risque | |
650 | 4 | |a risk management | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Films de formation | |
650 | 4 | |a Films autres que de fiction | |
650 | 4 | |a Vidéos sur Internet | |
700 | 1 | |a Gordon, Adam |e VerfasserIn |4 aut | |
700 | 1 | |a Memos, Zachary |e VerfasserIn |4 aut | |
710 | 2 | |a ACI Learning, |e MitwirkendeR |4 ctb | |
710 | 2 | |a Packt Publishing. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781835886502/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-100859518 |
---|---|
_version_ | 1831287148862504960 |
adam_text | |
any_adam_object | |
author | Gordon, Adam Memos, Zachary |
author_corporate | ACI Learning Packt Publishing |
author_corporate_role | ctb ctb |
author_facet | Gordon, Adam Memos, Zachary ACI Learning Packt Publishing |
author_role | aut aut |
author_sort | Gordon, Adam |
author_variant | a g ag z m zm |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)100859518 (DE-599)KEP100859518 (ORHE)9781835886502 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03875ngm a22005412c 4500</leader><controlfield tag="001">ZDB-30-ORH-100859518</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240227122213.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240227s2024 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781835886502</subfield><subfield code="c">electronic video</subfield><subfield code="9">978-1-83588-650-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1835886507</subfield><subfield code="c">electronic video</subfield><subfield code="9">1-83588-650-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100859518</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP100859518</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781835886502</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100859518</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240130</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">NIST cybersecurity and risk management frameworks</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file (21 hr., 25 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The course kicks off with an exploration of NIST Cybersecurity and Risk Management Frameworks, offering insights into their significance in today's digital landscape. You'll delve into NIST publications, relationships, and the framework's core components, setting a strong foundation. As the course progresses, you'll gain an in-depth understanding of NIST Cybersecurity Framework (CSF) and Risk Management Framework (RMF). Discover how to assess risks, categorize information systems, and select appropriate security controls. Learn to create System Security Plans (SSPs) and implement security controls effectively. The course wraps up by emphasizing the importance of a risk-based approach to security, highlighting the RMF preparation step, and covering topics like system authorization, risk response, and change management. What you will learn Navigate complex NIST relationships and standards Conduct risk assessments and categorization Implement security controls effectively Ensure system authorization and risk response Manage change and configuration control Handle system disposal and continuity of operations Audience This course is ideal for cybersecurity professionals and risk managers seeking expertise in NIST frameworks. Basic knowledge of cybersecurity concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion du risque</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gordon, Adam</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Memos, Zachary</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ACI Learning,</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Packt Publishing.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781835886502/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-100859518 |
illustrated | Not Illustrated |
indexdate | 2025-05-05T13:25:19Z |
institution | BVB |
isbn | 9781835886502 1835886507 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file (21 hr., 25 min.)) sound, color. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Packt Publishing |
record_format | marc |
spelling | NIST cybersecurity and risk management frameworks [First edition]. [Place of publication not identified] Packt Publishing 2024 1 Online-Ressource (1 video file (21 hr., 25 min.)) sound, color. zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed January 30, 2024) The course kicks off with an exploration of NIST Cybersecurity and Risk Management Frameworks, offering insights into their significance in today's digital landscape. You'll delve into NIST publications, relationships, and the framework's core components, setting a strong foundation. As the course progresses, you'll gain an in-depth understanding of NIST Cybersecurity Framework (CSF) and Risk Management Framework (RMF). Discover how to assess risks, categorize information systems, and select appropriate security controls. Learn to create System Security Plans (SSPs) and implement security controls effectively. The course wraps up by emphasizing the importance of a risk-based approach to security, highlighting the RMF preparation step, and covering topics like system authorization, risk response, and change management. What you will learn Navigate complex NIST relationships and standards Conduct risk assessments and categorization Implement security controls effectively Ensure system authorization and risk response Manage change and configuration control Handle system disposal and continuity of operations Audience This course is ideal for cybersecurity professionals and risk managers seeking expertise in NIST frameworks. Basic knowledge of cybersecurity concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts. Computer security Risk management Sécurité informatique Gestion du risque risk management Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet Gordon, Adam VerfasserIn aut Memos, Zachary VerfasserIn aut ACI Learning, MitwirkendeR ctb Packt Publishing. MitwirkendeR ctb |
spellingShingle | Gordon, Adam Memos, Zachary NIST cybersecurity and risk management frameworks Computer security Risk management Sécurité informatique Gestion du risque risk management Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
title | NIST cybersecurity and risk management frameworks |
title_auth | NIST cybersecurity and risk management frameworks |
title_exact_search | NIST cybersecurity and risk management frameworks |
title_full | NIST cybersecurity and risk management frameworks |
title_fullStr | NIST cybersecurity and risk management frameworks |
title_full_unstemmed | NIST cybersecurity and risk management frameworks |
title_short | NIST cybersecurity and risk management frameworks |
title_sort | nist cybersecurity and risk management frameworks |
topic | Computer security Risk management Sécurité informatique Gestion du risque risk management Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
topic_facet | Computer security Risk management Sécurité informatique Gestion du risque risk management Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
work_keys_str_mv | AT gordonadam nistcybersecurityandriskmanagementframeworks AT memoszachary nistcybersecurityandriskmanagementframeworks AT acilearning nistcybersecurityandriskmanagementframeworks AT packtpublishing nistcybersecurityandriskmanagementframeworks |