NIST Cybersecurity Framework Training Boot Camp

This three-day course teaches you how to employ the NIST Cybersecurity Framework in order to better manage and reduce your organization’s cybersecurity risk.

Award-Winning Training

For 20 years InfoSec has been one of the most awarded and trusted information security training vendors — 40+ industry awards!

Track Record of Success

InfoSec Institute training courses have received 9,000+ 5-star reviews from our students!

Analysts Recommended

IDC lists InfoSec Institute as Major Player in their Security Training Vendor Assessment.

NIST Cybersecurity Framework Course Overview

In February 2013, the President of the United States issued Executive Order (EO) 13636, “Improving Critical Infrastructure Cybersecurity,” to address the growing threat to U.S. critical infrastructure. The purpose of the EO was to “enhance the security and resilience of the Nation’s critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties.”

The order provided a mandate to establish a voluntary common framework for cybersecurity defense. In response to this mandate, the National Institute of Standards and Technology (NIST) was tasked with development of the Framework for Improving Critical Infrastructure Cybersecurity, more commonly known as the Cybersecurity Framework. Although it was designed specifically for companies that are part of the U.S. critical infrastructure, many other organizations in the private and public sectors, including federal agencies, are using the framework as a helpful tool in managing cybersecurity risks.

Our program introduces risk frameworks and provides you with comprehensive coverage of each of the three NIST Cybersecurity Framework components: the framework core, the framework implementation tiers and the framework profiles.

Award-Winning Training

What Will You Learn?

  • After attending our NIST Cybersecurity Framework boot camp, you will gain sufficient knowledge to be able to:
    • Implement the NIST Cybersecurity Framework to identify, assess and manage cybersecurity risk
    • Identify connections between business drivers and cybersecurity activities
    • Determine activities that are most important to critical service delivery
    • Prioritize expenditures to maximize the impact of the investment

Who Should Attend?

  • -Enterprise system architects (CTO, CIO)

  • -Information security professionals (CISO, CSO)

  • -IT compliance and auditing professionals (CISM, CISA)

  • -Professionals responsible for information risk management

Why Choose InfoSec for NIST CSF Training?

100% Satisfaction Guarantee — If you’re not 100% satisfied with your training at the end of the first day, you may enroll in a different Flex Pro or Flex Classroom course

Training to Fit Your Schedule — Train from anywhere with live online Flex Pro courses, train across the U.S. with Flex Classroom or train at-your-own pace with Flex Basic

Experienced Instructors — InfoSec Institute instructors have at least 10 years of industry training experience and are professionals with active roles in the industry

What Our Students Are Saying

Without any question, InfoSec has the most gifted individual instructors. Our instructor for this class was both an excellent educator and a premier/world class security expert. He was able to clearly explain and impart to the students, the most complicated security techniques I have ever heard of or imagined. I simply can not find the words to recommend him and Infosec security training more highly.
JH

John Hollan GE

Advanced Ethical Hacking Training Boot Camp

Our Major Clients

NIST Cybersecurity Framework Course Syllabus

    Our instructors give you 100% of their time and dedication to ensure that your time is well spent. You receive an immersive experience with no distractions! The typical daily schedule is:

    • Day 1: Risk frameworks
      • Course introduction
      • Legal/governmental guidelines
        • Legislative
        • Regulatory
    • Day 2: CSF Components and Processes
      • NIST frameworks
        • RMF
        • CSF
      • CSF components
        • Profile
          • Current profile
          • Target profile
        • Core
          • Functions
          • Categories
          • Subcategories
          • Informative references
        • Implementation tiers
          • Tier 1: Partial
          • Tier 2: Risk informed
          • Tier 3: Repeatable
          • Tier 4: Adaptive
        • CSF processes (5 steps)
          • Identify
    • Day 3: CSF Processes and Implementation
      • CSF processes (cont.)
        • Protect
        • Defend
        • Respond
        • Recover
      • 7-step approach to establishing or improving a cybersecurity program
        • Step 1: Prioritize and scope
        • Step 2: Orient
        • Step 3: Create a current profile
        • Step 4: Conduct a risk assessment
        • Step 5: Create a target profile
        • Step 6: Determine, analyze and prioritize gaps
      • Links from CSF to security controls, COBIT 5 and ISO 27001

    View Pricing

    We will never share any of your information, spam you or annoy you with pushy sales pitches.

    Book your course

      Ready to get started? Get instant pricing for this award-winning boot camp. View course pricing
      View instant course pricing