This comprehensive course delves into the NIST Risk Management Framework, guiding you through the process of selecting, implementing, and monitoring security controls. Beginning with an overview of control selection, you will explore various control frameworks, assess applicable laws and standards, and learn how to tailor control baselines to organizational needs. The course then transitions to implementing these controls, emphasizing the importance of documentation and approval processes to ensure compliance and system security.
Advanced Risk Management, Security Controls & Monitoring
This course is part of NIST Cybersecurity and Risk Management Frameworks Specialization
Instructor: Packt - Course Instructors
Sponsored by BrightStar Care
Recommended experience
What you'll learn
Analyze control frameworks to choose security controls fitting organizational needs.
Design tailored baselines and document controls per NIST standards.
Assess control implementations, identify gaps, and plan remediation.
Implement continuous monitoring and manage changes for ongoing security.
Details to know
Add to your LinkedIn profile
3 assignments
October 2024
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 5 modules in this course
In this module, we will explore the process of selecting appropriate security controls within the NIST Risk Management Framework. You will learn how to identify applicable rules and standards, set and tailor control baselines, allocate controls effectively, and document them for approval.
What's included
5 videos2 readings
In this module, we will delve into the practical aspects of deploying security controls in cybersecurity. You will learn how to implement, evaluate, and document these controls, ensuring that they meet the necessary standards and requirements.
What's included
3 videos
In this module, we will cover the entire assessment process within the NIST RMF. You will learn to plan, conduct, and document assessments, as well as to identify and remediate risks based on the findings.
What's included
6 videos1 assignment
In this module, we will focus on the final steps of system authorization and risk response. You will learn about the authorization process, how to document risk responses, and strategies for mitigating identified risks.
What's included
2 videos
In this module, we will examine the continuous monitoring and change control processes in cybersecurity. You will learn to manage system changes, handle configuration control, and evaluate secure methods for system disposal at the end of its lifecycle.
What's included
3 videos1 reading2 assignments
Instructor
Offered by
Why people choose Coursera for their career
Recommended if you're interested in Computer Science
Board Infinity
Kennesaw State University
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy