TOIT Training
(909) 252-7584
[email protected]
Search
Log in
Menu
Home
Library
IT Library
Developer Courses
User Cuorses
Plans & Pricing
Features
About Us
Contact Sales
Roadmap
Home
Courses
Cybersecurity
NIST 2.0 Functions: Identify and Protect
Curriculum
2 Sections
18 Lessons
1 Hour
Expand all sections
Collapse all sections
01. The Identify Function
7
1.1
Identify Function: Continuous Improvement of Cybersecurity Controls
1.2
Identify Function: Scheduled Re-Assessments
1.3
Identify Function: Ongoing Monitoring
1.4
Identify Function: Maintaining a Risk Register
1.5
Identify Function: Risk Assessment
1.6
The Identify Function’s Scope
1.7
Identify
02. The Protect Function
11
2.1
Protect Function: Technology Infrastructure Resilience: Resilience Planning, Failover, and Redundancy
2.2
Protect Function: Technology Infrastructure Resilience: Network Segmentation
2.3
Protect Function: Endpoint Security
2.4
Protect Function: Patch Management
2.5
Protect Function: System Hardening
2.6
Protect Function: Multi-Factor Authentication
2.7
Protect Function: RBAC
2.8
Protect Function: Data Security Measures
2.9
Protect Function: Technical Controls
2.10
Protect Function: Physical Controls
2.11
Protect
This content is protected, please
login
and
enroll
in the course to view this content!