Become a certified Lead Cybersecurity
Professional today
CertiProf® is now offering the professional certification in Cybersecurity, Lead Cybersecurity Professional Certificate (LCSPC), where you will learn the fundamental concepts of Cybersecurity and implement the practice of protecting systems, networks and programs from digital attacks. These cyber attacks generally aim to access, change or destroy confidential information; extort money from users; or interrupt normal business processes.
The implementation of effective cybersecurity measures is particularly challenging today because there are more devices than people, and the attackers are becoming more innovative. This certification will help you understand the basic functions of a security framework and the importance of establishing cybersecurity to protect information based on the three pillars of data security.
Duration
6 days / 48 hours
Level
Intermediate to Professional
Delivery
100% Online - Instructor Led
Request For Information
Pre-Requisites
- There are no formal prerequisites for this certification.
Exam Format and Duration
- Format: Multiple choice. 40 Questions.
- Duration: 60 minutes maximum, for all candidates in their respective language.
- Prerequisite: None.
- Supervised: It will be at the Partner’s discretion.
- Open book: No.
- Pass Score: 24/40 or 60 %.
- Delivery: This examination is available online.
Who Should Join
- Anyone interested in expanding their knowledge to learn more about the importance of cybersecurity and learn how to avoid all types of threats, that put at risk the information that is processed, transported and stored on any device.
Key Learning Objectives
- Fundamental Concepts of Cybersecurity.
- ISO / IEC 27032.
- Introduction to cybersecurity framework.
- Risk management and the cybersecurity framework.
- Implementation of the cybersecurity framework.
- Establish or improve communicative cybersecurity.
- Methodology to protect privacy and civil liberties.
- Self-assessment of cybersecurity risk with the framework.
Program Modules
Module 1 : Fundamental Concepts of Cybersecurity
Module 1 : Fundamental Concepts of Cybersecurity
- Introduction
- The Nature of Cybersecurity
- Approach to Cybersecurity
- Stakeholders in Cyberspace
- Assets in Cyberspace
- Threats in Cyberspace
- Roles of the Stakeholders in Cybersecurity
Module 2 : Cybersecurity Overview
Module 2 : Cybersecurity Overview
- Cybersecurity Evolution
- The Cybersecurity Skills Gap
- Cybersecurity Objectives
- Cybersecurity Roles
- The Five Core Functions of the Framework
- National Cybersecurity Strategies Evaluation Tool
- Approaches to Implement Cybersecurity
- Cybersecurity Key Terms
- Most Common Types of Cyberattacks
- Cybersecurity Threat Agents
- States as Agents of Threats
- Global Risks Report 2020
- Security Incident Response Policy
- History & Development of the Framework
- Executive Order 13636
- Evolution of the Framework
- Global Cybersecurity Index (GCI)
- Heat Map of National Cybersecurity Commitment
- National Cybersecurity Index
Module 3 : NICE: Cybersecurity Workforce Framework
Module 3 : NICE: Cybersecurity Workforce Framework
- NICE: National Initiative for Cybersecurity Education
- NICE Framework Components
- Framework Components
- Framework Components Relationship
- Framework Categories
- Analyze
- Collect and Operate
- Investigate
- Operate and Maintain
- Supervise and Govern
- Protect and Defend
- Safe Provision
- Workshop
Module 4 : ISO/IEC 27032
Module 4 : ISO/IEC 27032
- Introduction
- Applicability
- Introduction
- Structure ISO/IEC 27032
- ISO 27000 Family
- Other Resources in Cybersecurity
Module 5 : Cybersecurity Framework Introduction
Module 5 : Cybersecurity Framework Introduction
- Framework Introduction
- NIST Cybersecurity Framework (CSF) Reference Tool
- The Cyber Security Evaluation Tool (CSET®)
- Resources
- NIST Translations
Module 6 : Cybersecurity Framework Overview
Module 6 : Cybersecurity Framework Overview
- Framework Overview
- Framework Core
- Framework Implementation Tiers
- Framework Profile
Module 7 : Risk Management and the Cybersecurity Framework
Module 7 : Risk Management and the Cybersecurity Framework
- Risk Management and the Cybersecurity Framework
Module 8 : Cybersecurity Framework Basics
Module 8 : Cybersecurity Framework Basics
- Framework Basic Concepts
Module 9 : Module 9 : Cybersecurity Framework Core
Module 9 : Cybersecurity Framework Core
- Framework Core
- Functions
- Categories
- Subcategories
- Informative References
Module 10 : The Five Core Functions of the Cybersecurity Framework
Module 10 : The Five Core Functions of the Cybersecurity Framework
- The Five Core Functions of the Framework
- Identify
- Protect
- Detect
- Respond
- Recover
- Informative References: What are they, and how are they used?
Module 11 : Cybersecurity Framework Implementation Tiers
Module 11 : Cybersecurity Framework Implementation Tiers
- Framework Implementation Tiers
- Tier 1: Partial
- Tier 2: Risk Informed
- Tier 3: Repeatable
- Tier 4: Adaptive
Module 12 : Cybersecurity Framework Profile
Module 12 : Cybersecurity Framework Profile
- Framework Profile
Module 13 : Coordination of Cybersecurity Framework Implementation
Module 13 : Coordination of Cybersecurity Framework Implementation
- Coordination of Framework Implementation
Module 14: Module 14 : How to Use the Framework
Module 14 : How to Use the Framework
- How to Use the Framework
Module 15 : Basic Review of Cybersecurity Practices
Module 15 : Basic Review of Cybersecurity Practices
- Basic Review of Cybersecurity Practices
Module 16 : Establishing or Improving a Cybersecurity Program
Module 16 : Establishing or Improving a Cybersecurity Program
- Establishing or Improving a Cybersecurity Program
- Step 1: Prioritize and Scope
- Step 2: Orient
- Step 3: Create a Current Profile
- Step 4: Conduct a Risk Assessment
- Step 5: Create a Target Profile
- Step 6: Determine, Analyze, and Prioritize Gaps
- Step 7: Implement Action Plan
- Establishing or Improving a Cybersecurity Program
Module 17: Module 17 : Communicating Cybersecurity Requirements with Stakeholders
Module 17 : Communicating Cybersecurity Requirements with Stakeholders
- Communicating Cybersecurity Requirements with Stakeholders
Module 18 : Buying Decisions
Module 18 : Buying Decisions
- Buying Decisions
Module 19 : Identifying Opportunities for New or Revised Informative References
Module 19 : Identifying Opportunities for New or Revised Informative References
- Identifying Opportunities for New or Revised Informative References
Module 20 : Methodology to Protect Privacy and Civil Liberties
Module 20 : Methodology to Protect Privacy and Civil Liberties
- Methodology to Protect Privacy and Civil Liberties
Module 21 : Self-Assessing Cybersecurity Risk with the Framework
Module 21 : Self-Assessing Cybersecurity Risk with the Framework
- Self-Assessing Cybersecurity Risk with the Framework
Module 22 : Appendix A: Framework Core
Module 22 : Appendix A: Framework Core
- Appendix A: Framework Core
Module 23 : Appendix B: Glossary
Module 23 : Appendix B: Glossary
- Buyer
- Category
- Critical Infrastructure
- Cybersecurity
- Cybersecurity Event
- Cybersecurity Incident
- Cybersecurity Incident
- Framework
- Framework Core
- Framework Implementation Tier
- Framework Profile
- Function
- Identify (function)
- Informative Reference
- Mobile Code
- Protect (function)
- Privileged User
- Recover (function)
- Respond (function)
- Risk
- Risk Management
- Subcategory
- Supplier
- Taxonomy
Module 24 : Appendix C: Acronyms
Module 24 : Appendix C: Acronyms
- Appendix C: Acronyms
Our Training Methodology
Practical Assignments
We provide hands-on assignments that requires practical implementation.
Virtual Coaching Sessions
Online coaching sessions that happen over the phone, via video, or on a web platform.
1 Year Access to LMS
Get access to learning resources upto 1 year of class completion.
Live Project Experience
Hands-on learning and training gives participants the opportunity to experience real world situations.
Online Assessments
Participants can assess reflect on their own learning and their level/skills.
Free Industry Webinars
Stay current on market research trends, learn best practices through our webinar sessions.
Program Key Highlights
48 hours of Remote Online Learning
Additional Coaching Hours
Live Hands-on Projects
Certified by International Body
Mentorship with Industry Experts
Designed for Beginners & Professionals
Request For Information
Get Professionally Certified
Upon successfully completing this program, participants will be awarded the Agile HR Certified Professional Certificate by Certiprof.
This award is a validation to the efforts taken to master the domain expertise that will set you apart from your competition.
Be a part of the global network of professionals and join the community across sectors.
Memberships
READY TO KICKSTART YOUR CAREER?
Please fill in the form and a Program Advisor will reach out to you. You can also reach out to us at info@thulija.com or +60123661502
Contact us on Whatsapp for more enquiries