Autoplay
Autocomplete
Previous Lesson
Complete and Continue
A/CCRP Course + Textbook (AKYLADE Certified Cyber Resilience Practitioner)
Introduction
0.1 Become an AKYLADE Certified Cyber Resilience Practitioner (1:11)
0.2 Welcome to the Course! (10:31)
0.3 How to Access Course Resources (1:33)
0.4 Your Opportunity to Network in Simply Cyber Discord (1:36)
0.5 Lesson Components
0.6 What to Expect on Exam Day (3:26)
0.7 Exam Readiness: More Tips
0.8 Resume Bullets Unlocked
0.9 Exclusive Lessons to Simply Cyber Academy ⭐ (4:04)
0.10 Simply Cyber Discount Code for AKYLADE Exam Vouchers
Chapter 11: The CR-MAP Process
11.1 Introduction & Exam Objectives (8:27)
11.2 The CR-MAP Process - ⭐ ft. Dr. Gerald Auger (10:40)
11.3 CR-MAP Process Phase 1 Primer: Discover Your Top Cyber Risks (5:59)
11.4 CR-MAP Process Phase 2 Primer: Create Your Action Plan (6:49)
11.5 CR-MAP Process Phase 3 Primer: Maintenance and Updates (2:51)
11.6 The Five Questions (2:34)
11.7 Fostering Security Culture (9:05)
11.8 Attorney-Client Privilege (2:47)
11.9 Conclusion and Touchpoints (2:19)
11.10 Quiz
Chapter 12 - Module A: Preparation & Stakeholder Engagement
12.1 Introduction & Exam Objectives (5:02)
12.2 Be a Compass for Risk Decisions (2:34)
12.3 Step 1: Widen Your Scope - Part 1 - ⭐ ft. Dr. Gerald Auger (16:42)
12.4 Step 1: Widen Your Scope - Part 2 (4:22)
12.5 Step 2: Get Buy In, "Winning Hearts and Minds" (7:37)
12.6 Step 3: Select Interviewees (3:02)
Chapter 12 - Module B: Creating Assessment Questionnaires
12.7 Step 4: Generate the Questionnaire (7:06)
12.8 Step 4 Continued: Scoring Criteria (7:21)
12.9 Step 5: Determine Target Scores - ⭐ ft. Dr. Gerald Auger (5:03)
12.10 Step 5: Determine Target Scores - Examples (4:48)
Chapter 12 - Module C: Spreadsheet Lab
12.11 How to Make a Scorecard That Wins Hearts and Minds (44:40)
12.12 Top 2 Spreadsheet Skills for Data Analysis (3:26)
Chapter 12 - Module D: Conducting Assessments
12.13 Step 6: Conduct the Interviews (8:17)
12.14 Step 7: Compile and Average the Scores (2:23)
12.15 Step 8: Communicate Your Top 5 Cyber Risks (6:17)
12.16 Conclusion and Touchpoints (1:53)
12.17 Quiz
Chapter 12 - Module E: Technical Risk Assessment (Bonus)
12.17 Analyzing Network Diagrams Part 1 - ⭐ ft. Dr. Gerald Auger (8:08)
12.18 Analyzing Network Diagrams Part 2 - ⭐ ft. Dr. Gerald Auger (9:51)
Chapter 13 Module A: Foundations of CR-MAP Phase 2
13.1 Introduction & Exam Objectives - Featuring Simply Cyber Jaw Jacking (5:22)
13.2 ASUS Responsible Disclosure (3:54)
13.3 More Responsible Disclosure Case Studies (5:48)
13.4 Keys to Success (Prioritization, Roles) (12:36)
13.5 Controlling the Rate of Change (4:46)
13.6 Developing an Action Plan Overview (3:29)
13.7 (Step 1) Close the Identified Gaps - ⭐ ft. Dr. Gerald Auger (7:40)
Chapter 13 - Module B: Supply Chain Risk Management
13.8 Backgrounder on Supply Chain Risk Management (18:36)
13.9 Assessing Third Party Risk (8:12)
13.10 Supply Chain Security Requirements (7:58)
13.11 AI Augmented Contract Review (6:41)
13.12 Supply Chain Risk Lifecycle (15:03)
13.13 Supply Chain Risk Assessment Tools (6:57)
Chapter 13 - Module C: Core Security Controls
13.14 Governance and Why Policies Matter (7:07)
13.15 Protecting Data in Transit and at Rest (7:13)
13.16 Access Permissions & Data Lifecycle (6:02)
13.17 Identity Management, Authentication, and Access Control - ⭐ ft. Dr. Gerald Auger in the Daily Cyber Threat Briefing (10:28)
13.18 Awareness and Training (10:31)
13.19 Incident Response Reporting and Communication (9:03)
Chapter 13 - Module D: Busines Value, Financial Analysis & Prioritization
13.20 (Step 1) Considerations: Cybersecurity Org Size and Design (9:15)
13.21 3TCO: 3-Year Total Cost of Ownership - ⭐ ft. Jason Dion in Cyber Coffee Hour (19:50)
13.22 (Step 2) Business Value Analysis - ⭐ ft. Jason Dion in Cyber Coffee Hour (9:17)
13.23 (Step 2) Business Value Analysis Continued (20:13)
Chapter 13 - Module E: Communicating Your CR-MAP
13.19 (Step 3) Create a Dashboard and Roadmap (4:31)
13.20 (Step 4) Internal Marketing Presentation (9:05)
13.21 Internal Marketing Key Success Factors (5:10)
13.22 (Step 5) External Marketing (2:53)
13.23 Conclusion & Touchpoints (1:55)
13.24 Quiz
Chapter 14 - Phase 3: Maintenance and Updates
14.1 Introduction & Exam Objectives (6:05)
14.2 Equifax Data Breach Case Study (8:51)
14.3 AI Augmented NIST CSF Assessment (9:40)
14.4 Four Maintenance Steps (9:59)
14.5: AI Augmented Risk Assessments - ⭐ ft. Dr. Gerald Auger (37:04)
14.6 Conclusion and Touchpoints (1:57)
14.7 Quiz
Chapter 15 - Exclusive Simply Cyber Academy Content - ⭐ ft. Dr. Gerald Auger
15.1 CSF Profile Assessment Database (24:52)
15.2 Open Source Cybersecurity Framework (CSF) Assessment Tool - Pointy Clicky How to Install Demo (3:03)
15.3 CSF Profile Assessment Excel Workbook - Data Analysis Techniques (8:41)
15.4 Securing Growth: Alma Security Business Case Study (7:17)
15.5 Enterprise Risk Assessment Security Control "Rosetta Stone"
15.6 NEW version 1.1: Enterprise Risk Assessment Rosetta Stone - Audit Procedures (6:46)
15.7 ERA Rosetta Stone: ID.AM-01, 02 Asset Management (9:46)
15.8 ERA Rosetta Stone: ID.IM-02 Improvement (8:14)
15.9 ERA Rosetta Stone: ID.AU-02 Event Logging (6:04)
15.10 ERA Rosetta Stone: RS.MA-05 Incident Management (4:19)
15.11 ERA Rosetta Stone: RC.RP-03 Incident Recovery Plan Execution (6:15)
15.12 From (the Legendary) GRC Masterclass: NIST Cybersecurity Framework (CSF) 2.0 Bonus Material (30:02)
15.13 Resignation Letter Template + 3 Resume Templates
Chapter 16 - Feedback
16.1 Leave Feedback (0:06)
Practice Exams
Practice Exam #1
Practice Exam #2
Practice Exam #3
Practice Exam #4
Practice Exam #5
Practice Exam #6
Practice Exam #7
Refresher on Chapter 1-10 Foundational Concepts
12.3 Step 1: Widen Your Scope - Part 1 - ⭐ ft. Dr. Gerald Auger
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock