We may earn an affiliate commission when you visit our partners.
Course image
Ross Casanova

This course will help you to build a basic understanding of NIST cybersecurity fundamentals. You will learn about the RMF process and managing risk by identifying, assessing and responding to risk. Additionally, you will learn how to use the framework to assess an organization's cybersecurity risk and the steps to implement or improve a cybersecurity program. The Cybersecurity Framework skill path introduces the framework for improving infrastructure cybersecurity.

Enroll now

What's inside

Syllabus

NIST CSF instructor and path introduction
This video introduces the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) 2.0 for improving critical infrastructure cybersecurity.
Read more
NIST cybersecurity basics
The NIST CSF contains terminology and concepts that may be expressed in specific ways to include perspectives and usages that may be unique to the framework implementation and different from what you are used to dealing with in your normal operations. You must have a basic understanding of security fundamentals used throughout the industry. For instance, the familiar CIA triad will be mentioned extensively throughout our courses. Additionally, there are some aspects of the framework that are contained throughout all discussion of the topics in this course. We’re introducing them here, they include: Cybersecurity & Information Security, Drivers of Business & Environments, and Cybersecurity Fundamentals. These concepts will be included in various discussions throughout all modules of this course, and you should become familiar with them.
Cybersecurity framework components
The NIST CSF, because it is a risk-based approach for managing cybersecurity risk, is composed of three parts: the Framework Core with its four areas and five processes, the four Framework Implementation Tiers and its programs and processes, and the Framework Profiles, goals, types and levels. Each Framework component reinforces the connection between business and mission drivers and cybersecurity activities.
Communicating cybersecurity requirements
The NIST CSF provides a common language to communicate requirements among interdependent stakeholders responsible for the delivery of essential critical infrastructure products and services. For example, an organization may use a target profile to express cybersecurity risk management requirements to an external service provider (e.g., a cloud provider to which it is exporting data). In addition, an organization may express its cybersecurity state through a current profile to report results or to compare with acquisition requirements, we will cover more examples in the course.
Risk management
Risk management is the ongoing process of identifying, assessing, and responding to risk. To manage risk, organizations should understand the likelihood that an event will occur and the potential resulting impacts. With this information, organizations can determine the acceptable level of risk for achieving their organizational objectives and can express this as their risk tolerance. Risks affecting organizations can have consequences from economic performance impacts to professional reputation. In this course we discuss the RMF process which provides a disciplined, structured, and flexible process for managing security and privacy risk which includes information security categorization; control selection, implementation, and assessment; system and common control authorizations; and continuous monitoring. We also discuss how managing risk by identifying, assessing, and responding to risk helps organizations perform better in an environment full of uncertainty.
Cyber supply chain risk management (SCRM)
Cyber SCRM is the set of activities necessary to manage cybersecurity risk associated with external parties. More specifically, cyber SCRM addresses both the cybersecurity effect an organization has on external parties and the cybersecurity effect external parties have on an organization.
Cybersecurity framework core functions
The core functions are a listing of categories, subcategories and informative references that describe specific cybersecurity activities common across all critical infrastructure sectors. They are not intended to form a serial path or lead to a static desired end state. Rather, the functions should be performed concurrently and continuously to form an operational culture that addresses the dynamic cybersecurity risk. This course describes the six framework core functions (Govern, Identify, Protect, Detect, Respond and Recover) and includes descriptions of categories, subcategories and informative references.
7-step cybersecurity framework process
The CSF is designed to complement existing business and cybersecurity operations. It can serve as the foundation for a new cybersecurity program or a mechanism for improving an existing program. It provides a means of expressing cybersecurity requirements to business partners and customers. Additionally, it can help identify gaps in an organization’s cybersecurity practices. The course outlines the steps an organization can use to compare their current cybersecurity activities with those outlined in the CSF core through the creation of profiles to determine if it has opportunities to or needs to improve.
Cybersecurity framework self assessment process
The CSF is designed to reduce risk by improving the management of cybersecurity risk to organizational objectives. Ideally, organizations using the Framework will be able to measure and assign values to their risk along with the cost and benefits of steps taken to reduce risk to acceptable levels. This course describes the importance of having a clear understanding of the organizational objectives, the relationship between those objectives and supportive cybersecurity outcomes, and how those discrete cybersecurity outcomes are implemented and managed to assist the organization in predicting whether a cybersecurity risk may occur, and the impact it might have.
Cybersecurity Framework Summary and Tips

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Builds a basic understanding of NIST cybersecurity fundamentals, which is standard in the discipline of cybersecurity
Taught by Ross Casanova, who are recognized for their work in NIST cybersecurity fundamentals
Examines NIST cybersecurity fundamentals, which is highly relevant to those new to the field of cybersecurity
Develops core skills for cybersecurity professionals, such as risk identification and assessment
Teaches tools and knowledge, such as the NIST Cybersecurity Framework, which are highly relevant to cybersecurity practice
Provides hands-on labs and interactive materials that aid learning and retention of concepts

Save this course

Save NIST CSF to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in NIST CSF with these activities:
Review network security concepts
Reviewing network security concepts will help you understand how to protect your organization's network from cyber attacks.
Browse courses on network security
Show steps
  • Read a book on network security
  • Watch a video tutorial on network security
  • Take a quiz on network security
Review cyber security basics
Reviewing the basics of cyber security will provide you with a strong foundation for understanding the NIST Cybersecurity Framework (NIST CSF).
Browse courses on Cybersecurity Framework
Show steps
  • Read the NIST CSF Overview document
  • Watch a video tutorial on the NIST CSF
  • Take a quiz on the NIST CSF
Practice configuring a firewall
Practicing configuring a firewall will help you understand how to protect your organization's network from cyber attacks.
Browse courses on Firewall Configuration
Show steps
  • Identify the different types of firewalls
  • Configure a firewall to protect your network
  • Test your firewall to make sure it is working properly
Four other activities
Expand to see all activities and additional details
Show all seven activities
Conduct a cyber security risk assessment
Conducting a cyber security risk assessment will help you identify and prioritize the risks to your organization's cyber security.
Browse courses on Risk Assessment
Show steps
  • Identify the assets that need to be protected
  • Identify the threats to those assets
  • Assess the likelihood and impact of each threat
  • Develop a plan to mitigate the risks
Create a cyber security awareness presentation
Creating a cyber security awareness presentation will help you raise awareness of cyber security risks and best practices.
Browse courses on Cybersecurity Awareness
Show steps
  • Identify the audience for your presentation
  • Research the topic of cyber security
  • Develop the content of your presentation
  • Create the visuals for your presentation
  • Rehearse your presentation
Attend a cyber security workshop
Attending a cyber security workshop will help you learn about the latest trends in cyber security and how to protect your organization from cyber attacks.
Browse courses on NIST CSF
Show steps
  • Find a cyber security workshop
  • Register for the workshop
  • Attend the workshop
Contribute to an open source cyber security project
Contributing to an open source cyber security project will help you learn about the latest trends in cyber security and how to protect your organization from cyber attacks.
Browse courses on NIST CSF
Show steps
  • Find an open source cyber security project
  • Read the project's documentation
  • Make a contribution to the project

Career center

Learners who complete NIST CSF will develop knowledge and skills that may be useful to these careers:
Information Security Manager
Information Security Managers are responsible for developing and implementing an organization's information security program. They also work to assess and mitigate security risks. This course provides a comprehensive overview of the NIST Cybersecurity Framework, which is a valuable resource for Information Security Managers. The course covers topics such as risk management, threat analysis, and incident response. This knowledge can help Information Security Managers develop and implement effective security programs to protect their organization's critical assets.
Information Security Analyst
Information Security Analysts design and implement security measures to protect an organization's computer networks and systems. They also monitor and analyze security systems to identify and respond to potential threats. This course provides a comprehensive overview of the NIST Cybersecurity Framework, which is a valuable resource for Information Security Analysts. The course covers topics such as risk management, supply chain risk management, and cybersecurity core functions. This knowledge can help Information Security Analysts develop and implement effective security measures to protect their organization's critical assets.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They also work to assess and mitigate security risks. This course provides a strong foundation in the NIST Cybersecurity Framework, which is an essential tool for Security Consultants. The course covers topics such as risk management, threat analysis, and incident response. This knowledge can help Security Consultants provide valuable advice and guidance to their clients.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain an organization's cybersecurity infrastructure. They also work to identify and mitigate security risks. This course provides a strong foundation in the NIST Cybersecurity Framework, which is an essential tool for Cybersecurity Engineers. The course covers topics such as risk management, threat analysis, and incident response. This knowledge can help Cybersecurity Engineers build and maintain a secure and resilient cybersecurity infrastructure.
Security Architect
Security Architects design and implement security solutions for an organization's information systems. They also work to assess and mitigate security risks. This course provides a comprehensive overview of the NIST Cybersecurity Framework, which is an invaluable resource for Security Architects. The course covers topics such as risk management, threat analysis, and incident response. This knowledge can help Security Architects design and implement effective security solutions to protect their organization's critical assets.
Risk Manager
Risk Managers identify, assess, and mitigate risks to an organization's assets. They also work to develop and implement risk management plans. This course provides a strong foundation in risk management, which is a key component of the NIST Cybersecurity Framework. The course covers topics such as risk assessment, risk mitigation, and risk reporting. This knowledge can help Risk Managers develop and implement effective risk management plans to protect their organization's critical assets.
Cybersecurity Specialist
Cybersecurity Specialists design, implement, and maintain an organization's cybersecurity infrastructure. They also work to identify and mitigate cybersecurity risks. This course provides a strong foundation in cybersecurity principles and practices, which is essential for Cybersecurity Specialists. The course covers topics such as risk management, threat analysis, and incident response. This knowledge can help Cybersecurity Specialists build and maintain a secure and resilient cybersecurity infrastructure.
Incident Responder
Incident Responders investigate and respond to security incidents. They also work to develop and implement incident response plans. This course provides a strong foundation in incident response, which is a key component of the NIST Cybersecurity Framework. The course covers topics such as incident investigation, incident containment, and incident recovery. This knowledge can help Incident Responders investigate and respond to security incidents effectively.
Compliance Manager
Compliance Managers ensure that an organization complies with laws and regulations. They also work to develop and implement compliance programs. This course provides a strong foundation in compliance management, which is a key component of the NIST Cybersecurity Framework. The course covers topics such as compliance assessment, compliance reporting, and compliance remediation. This knowledge can help Compliance Managers develop and implement effective compliance programs to protect their organization's critical assets.
Auditor
Auditors examine an organization's financial and operational records to ensure compliance with laws and regulations. They also work to identify and mitigate risks. This course provides a strong foundation in auditing principles and practices, which can be valuable for Auditors who are responsible for assessing an organization's cybersecurity posture. The course covers topics such as risk assessment, internal controls, and audit reporting. This knowledge can help Auditors identify and mitigate cybersecurity risks.
Security Analyst
Security Analysts monitor and analyze security systems to identify and respond to potential threats. They also work to investigate security incidents. This course provides a strong foundation in security monitoring and analysis, which is a key component of the NIST Cybersecurity Framework. The course covers topics such as security monitoring tools and techniques, threat analysis, and incident response. This knowledge can help Security Analysts identify and respond to cybersecurity threats effectively.
Fraud Investigator
Fraud Investigators investigate cases of fraud and financial crime. They also work to develop and implement fraud prevention programs. This course provides a strong foundation in fraud investigation, which can be valuable for Fraud Investigators who are responsible for investigating cybersecurity-related fraud. The course covers topics such as fraud detection, fraud investigation, and fraud prevention. This knowledge can help Fraud Investigators investigate and prevent cybersecurity-related fraud.
IT Auditor
IT Auditors examine an organization's IT systems to ensure compliance with laws and regulations. They also work to identify and mitigate risks. This course provides a strong foundation in IT auditing, which can be valuable for IT Auditors who are responsible for assessing an organization's cybersecurity posture. The course covers topics such as IT risk assessment, IT internal controls, and IT audit reporting. This knowledge can help IT Auditors identify and mitigate cybersecurity risks.
Forensic Analyst
Forensic Analysts collect and analyze evidence from computer systems to investigate crimes. They also work to develop and implement forensic investigation procedures. This course provides a strong foundation in forensic analysis, which can be valuable for Forensic Analysts who are responsible for investigating cybersecurity-related crimes. The course covers topics such as evidence collection, evidence analysis, and forensic reporting. This knowledge can help Forensic Analysts investigate and prosecute cybersecurity-related crimes.
System Administrator
System Administrators are responsible for maintaining and administering an organization's computer systems. They also work to identify and mitigate security risks. This course provides a strong foundation in system administration, which is a key component of the NIST Cybersecurity Framework. The course covers topics such as system security, system performance, and system recovery. This knowledge can help System Administrators maintain and administer secure and reliable computer systems.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in NIST CSF.
This publication from NIST provides a concise overview of the NIST Cybersecurity Framework, summarizing its key components and principles.
Offers a practical guide to implementing cybersecurity best practices and standards, including those outlined in the NIST CSF, providing valuable insights for organizations seeking to improve their cybersecurity posture.
This publication from NIST provides the latest version of the Security and Privacy Controls Catalog, which serves as a foundation for the NIST CSF.
This publication from NIST presents the Risk Management Framework (RMF), which is closely aligned with the NIST CSF and provides a structured approach to managing cybersecurity risk.
Provides insights into ethical hacking techniques and how they can be used to identify and mitigate vulnerabilities, complementing the NIST CSF's focus on vulnerability management.
Provides insights into social engineering and human factors in cybersecurity, complementing the NIST CSF's emphasis on cybersecurity awareness and training.
Covers cloud security best practices and frameworks, including the NIST CSF, providing guidance on securing cloud environments.
Offers a comprehensive overview of security engineering principles, providing foundational knowledge for understanding cybersecurity frameworks like the NIST CSF.
This classic work on cybersecurity provides a historical perspective on cybersecurity incidents and investigations, complementing the NIST CSF's focus on continuous monitoring and incident response.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to NIST CSF.
Cybersecurity Risk Management
NIST Cybersecurity and Risk Management Frameworks
Implementing the NIST Cybersecurity Framework (CSF)
A Strategic Approach to Cybersecurity
Cybersecurity Policy for Water and Electricity...
Security Governance & Compliance
Play It Safe: Manage Security Risks
Certificate in Cybersecurity Analysis (IIBA®-CCA):...
NICE Framework Overview
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser