Autoplay
Autocomplete
Previous Lesson
Complete and Continue
A/CCRF Complete Course + Exam Voucher (AKYLADE Certified Cyber Resilience Fundamentals)
Chapter 1: Introduction #TeamSC Let's Go!
1.1 Welcome to the Course! π (8:28)
1.2 How to Access Course Resources π
1.3 Study Note Downloads π
1.4 What to Expect on Exam Day and How to CRUSH It π₯ (4:21)
1.5 100% Pass Guarantee Policy π―
Chapter 2: Cybersecurity Fundamentals
2.1 Introduction and Exam Objectives ποΈ (1:19)
2.2 How Do You Define Cybersecurity? π (3:47)
2.3 The CIANA Pentagon π‘οΈ (4:19)
2.4 Cybersecurity incidents π¨ (3:12)
2.5 Risk = Threat x Vulnerability β οΈ (1:21)
2.6 Quiz π
2.7 Conclusion and Touchpoints β (0:54)
Chapter 3: Risk Management Fundamentals
3.1 Introduction and Exam Objectives ποΈ (4:15)
3.2 Risk Management Fundamentals 𧱠(3:55)
3.3 Phase One: Risk Identification ποΈ (4:13)
3.4 Phase Two: Risk Assessment βοΈ (7:30)
3.5 Phase Three: Risk Response Planning ποΈ (4:33)
3.6 Phase Four: Risk Mitigation π‘οΈ (5:52)
3.7 Phase Five: Risk Monitoring and Review π (0:53)
3.8 Inherent Risk and Residual Risk β οΈ (2:27)
3.9 Business Impact Analysis (BIA) π₯ (6:53)
3.10 Financial Analysis π (1:36)
3.11 Quiz π
3.12 Conclusion and Touchpoints β (0:42)
Chapter 4: NIST Cybersecurity Framework
4.1 Introduction and Exam Objectives ποΈ (3:32)
4.2 Development of the NIST Cybersecurity Framework π οΈ (5:27)
4.3 Relevant Executive Orders and Regulations π (3:24)
4.4 Applicability of the Cybersecurity Framework ποΈ (5:18)
4.5 Characteristics of the Framework π (5:47)
4.6 Cyber Resilience πͺ (1:37)
4.7 Critical Infrastructure βοΈ (2:21)
4.8 Intended Audience & Purpose of CSF π₯ (2:01)
4.9 Quiz
4.10 Conclusion and Touchpoints β (1:34)
Chapter 5: Framework Components
5.1 Introduction and Exam Objectives ποΈ (9:24)
5.2 Implementation Tiers πͺ (3:30)
5.3 The Framework Profile π€οΈ (2:08)
5.4 Quiz
5.5 Conclusion and Touchpoints β (1:42)
Chapter 6: Six CSF Functions
6.1 Introduction and Exam Objectives ποΈ (2:59)
6.2 GOVERN (GV) π (24:07)
6.3 IDENTIFY (ID) ποΈ (11:28)
6.4 PROTECT (PR) π‘οΈ (15:40)
6.5 DETECT (DE) β οΈ (6:12)
6.6 RESPOND (RS) π¨ (5:58)
6.7 RECOVER (RC) π οΈ (3:06)
6.8 Quiz
6.9 Conclusion and TouchPoints β (1:47)
Chapter 7: Controls and Outcomes
7.1 Introduction and Exam Objectives ποΈ (2:52)
7.2 Controls ποΈ (1:29)
7.3 Voluntary Nature of the NIST Cybersecurity Framework π (4:42)
7.4 Outcomes π (5:27)
7.5 Informative References π (2:33)
7.6 ISO/IEC 27001 and 27002 (1:36)
7.7 NIST Special Publications (2:45)
7.8 CRI (0:44)
7.9 CIS CSC (0:55)
7.10 COBIT 5 (1:05)
7.11 ITIL (1:17)
7.12 PCI DSS (1:00)
7.13 HIPPA (1:39)
7.14 NERC CIP (1:10)
7.15 FedRAMP (1:12)
7.16 STAR (0:53)
7.17 OWASP (0:59)
7.18 Quiz
7.19 Conclusion and Touchpoints β (0:41)
Chapter 8: Implementation Tiers
8.1 Introduction and Exam Objectives ποΈ (3:10)
8.2 Choosing an Implementation Tier π€ (7:37)
8.3 Implementation Tier Progression ποΈ (3:12)
8.4 Maturity Models π πΆ (5:36)
8.5 Strategies for Moving Between Implementation Tiers βοΈ (5:26)
8.6 Quiz
8.7 Conclusion and Touchpoints β (2:49)
Chapter 9: Profiles
9.1 Introduction and Exam Objectives ποΈ (1:53)
9.2 Profiles π€οΈ (3:04)
9.3 Creating a Profile π¨ (6:48)
9.4 Profile Tailoring πͺ‘ (10:09)
9.5 Sector-Specific Profiles ποΈ (0:38)
9.6 Cyber Risk Institute (CRI) Profile (2:02)
9.7 Manufacturing Profile (5:50)
9.8 Election Infrastructure Profile (2:23)
9.9 Hybrid Satellite Networks Profile (2:23)
9.10 Smart Grid Profile (1:02)
9.11 Connected Vehicle Profiles (1:28)
9.12 Payroll Profile (1:06)
9.13 Maritime Profile (1:15)
9.14 Communications Profile (1:23)
9.15 Profiles and Regulatory Compliance ποΈ (3:05)
9.16 Secure Once, Comply Many βοΈ (3:27)
9.17 Quiz
9.18 Conclusion and Touchpoints β (2:16)
Chapter 10: Assessing Cybersecurity Risk
10.1 Introduction and Exam Objectives (2:16)
10.2 Case Study: Meeting Our Client π€ (2:20)
10.3 Identifying Threats β οΈ (2:17)
10.4 Identifying Vulnerabilities π (2:42)
10.5 Identifying Risks π (1:54)
10.6 Risk Mitigation Recommendations π‘οΈ (2:45)
10.7 Benefits and Trade-offs of Risk Mitigations βοΈ (3:04)
10.8 Evaluating Effectiveness ποΈ (1:51)
10.9 Risk Management Plan π (1:44)
10.10 Cybersecurity Strategy βοΈ (2:35)
10.11 Quiz
10.12 Conclusion and Touchpoints β (2:11)
Practice Exams
Practice Exam 1
Practice Exam 2
Practice Exam 3
Practice Exam 4
Practice Exam 5
Practice Exam 6
Practice Exam 7
Epilogue: From Knowing Enough to be Part of the Team, to Leading It
The Next Step: Certified Cyber Resilience Practitioner (CCRP) (1:18)
Leave Feedback π (0:06)
Refer a Friend Program
9.5 Sector-Specific Profiles ποΈ
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock