Introduction
Secure your infrastructure with NIST
()
1. Review of Cybersecurity Fundamentals
Understanding and managing your risks
()
Cybersecurity threats and vulnerabilities
()
Cybersecurity requirements
()
NIST Cybersecurity Framework
()
Cybersecurity five-step process overview
()
Building a cybersecurity program
()
2. Identify
Inventory of critical assets
()
Business impact assessment
()
Security policies and procedures
()
I-AAA
()
3. Protect
Overview of defending business assets
()
Network defenses
()
System security
()
Encryption
()
Personnel and physical security
()
4. Detection
Detecting security issues overview
()
System auditing and logging
()
Monitoring and alerting
()
Assessments and audits
()
5. Respond
Establishing a response plan
()
Incident response plan examples
()
Digital forensics
()
Response testing and training
()
6. Recover
Your continuity of operations plan
()
Backups, virtualization, and the cloud
()
Conclusion
Best practices
()
Resources
()