Implementing the NIST Cyber Security Standards using COBIT 5
Implementing the NIST Cybersecurity Framework provides guidance in the implementation of the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) through a seven-step process, aligned with COBIT5 principles.
The purpose of the CSF Implementation qualification is to provide and measure a candidate’s knowledge and understanding of the CSF, its goals, the implementation steps, and the ability to apply this information. The COBIT 5 Foundation Qualification is not required; however, it is strongly recommended that candidates either have a strong COBIT 5 background or have taken the COBIT5 Foundation course. This course and exam is aimed at individuals who have a basic understanding of both COBIT5 and security concepts, and who are involved in improving the cybersecurity program for outside organizations or their own.
Course Description
In 2013, a legislation was passed that made it
mandatory to further Improving Critical Infrastructure
Cybersecurity, which called for the development of a voluntary
risk-based cybersecurity framework that is "prioritized, flexible,
repeatable, performance-based, and cost-effective." The
Cybersecurity Framework (CSF) was developed through an
international partnership of small and large organizations,
including owners and operators of the nation's critical
infrastructure, with leadership by the National Institute of
Standards and Technology (NIST). ISACA participated in the CSF's
development and helped embed key principles from the COBIT
framework into the industry-led effort. As part of the knowledge,
tools and guidance provided through our Cybersecurity Nexus (CSX)™
program, ISACA has developed a guide and course: Implementing NIST
Cybersecurity Framework Using COBIT 5.
This course is
focused on the Cybersecurity Framework (CSF), its goals, the
implementation steps and the ability to apply this information. The
course and exam are for individuals who have a basic understanding
of both COBIT 5 and security concepts, and who are involved in
improving the cybersecurity program for their
enterprises.
ISACA offers professionals who have mastered the content in the COBIT 5 Foundation Course an opportunity to demonstrate their knowledge by taking an exam and earning a certificate of completion. These professionals understand the goals and content of the Cybersecurity Framework and how implement the seven Cybersecurity Framework implementation steps using COBIT 5.
At the conclusion of this course, attendees will
understand
Target
Audience
Individuals who have a basic understanding of both COBIT5 and
security concepts, and who are involved in improving the
cybersecurity program for outside organizations or their own
organization.
Exam Format
© Copyright 2017 A2A IMTCS PVT LTD. All rights
reserved.
The Swirl logo is a trade mark of AXELOS Limited.
ITIL® is a Registered trade mark of AXELOS Limited.
PRINCE2® is a Registered Trade Mark of AXELOS Limited.
PRINCE2 Agile™ is a Trade Mark of AXELOS Limited.
MSP® is a Registered Trade Mark of AXELOS Limited.
M_o_R® is a Registered Trade Mark of AXELOS Limited.
P2MM® is a Registered Trade Mark of AXELOS Limited.
P3M3® is a Registered Trade Mark of AXELOS Limited.
P3O® is a Registered Trade Mark of AXELOS Limited.
PMP®, PMI, PMBoK are Registered Trade Marks of the Project
Management Institute.
APMP® is a Registered Trade Mark of APM (Association of Project
Management) part of IPMA.
IPMA: International Project Management Association
COBIT5® is a Registered Trade Mark of ISACA