Learning Security Frameworks

Go to class
Write Review

Free Online Course: Learning Security Frameworks provided by LinkedIn Learning is a comprehensive online course, which lasts for Less than 1 hour of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Learning Security Frameworks is taught by Mandy Huth.

Overview
  • Boost your organization's security posture with a security framework. Learn about the top four security frameworks, how they compare, and how you can create a core security set.

    Security frameworks are designed to help organizations boost their security posture. Such frameworks provide security practitioners—and their business partners—with a common set of practices to follow, as well as a baseline that makes it easier to report on improvements. In this course, join Mandy Huth as she covers the top four frameworks available, goes over how the frameworks compare, and shares how you can actually map your security controls across multiple frameworks. Mandy also shows how to determine your core security set, stepping through how to define what you'll do and how you'll measure it, and then prove that you did what you sought out to do. Throughout the course, she shares best practices that can help you start leveraging a security framework in your own company.

Syllabus
  • Introduction

    • Picking the right security framework
    • Who uses security frameworks?
    • Why are security frameworks important?
    • Definitions
    1. Frameworks, Regulations, and Risk
    • Overview of the major frameworks
    • Other frameworks to consider
    • Cybersecurity regulations
    • Risk assessment and the SIG
    2. Additional Considerations
    • PCI and credit card payments
    • CIS critical security controls
    • NIST 800-53: Guidance for US companies
    • ISO 27001: A global approach with certification
    3. Framework Comparison
    • How the frameworks compare
    • Mapping process controls
    • Mapping technical controls
    • Deciding on a framework
    4. The Core Security Set
    • The control families
    • The measures
    • The assurances
    • Augmenting frameworks with GRCs
    • Developing a security mindset
    Conclusion
    • Next steps