Autoplay
Autocomplete
Previous Lesson
Complete and Continue
A/CCRP Course + Textbook (AKYLADE Certified Cyber Resilience Practitioner)
Introduction
π‘0.0 Become an AKYLADE Certified Cyber Resilience Practitioner (1:11)
π 0.1 Preface: Where we left off in A/CCRF (1:18)
π 0.2 Welcome to the Course! (13:57)
π 0.3 Download Exam Objectives and Study Notes
𧩠0.4 Lesson Components
π₯ 0.5 What to Expect on Exam Day and How to CRUSH It (4:04)
Chapter 11: The CR-MAP Process
ποΈ 11.1 Introduction & Exam Objectives (8:49)
π 11.2 The CR-MAP Process - Featuring Dr. Gerald Auger! (10:40)
β οΈ 11.3 CR-MAP Process Phase 1 Primer: Discover Your Top Cyber Risks (5:59)
π 11.4 CR-MAP Process Phase 2 Primer: Create Your Action Plan (6:49)
π οΈ 11.5 CR-MAP Process Phase 3 Primer: Maintenance and Updates (2:51)
π€ 11.6 The Five Questions (2:34)
π‘οΈ 11.7 Fostering Security Culture (9:07)
βοΈ 11.8 Attorney-Client Privilege (2:47)
β 11.9 Conclusion and Touchpoints (2:19)
π 11.10 Quiz
Chapter 12 - Phase 1: Discovering Top Cyber Risks
ποΈ 12.1 Introduction & Exam Objectives (5:02)
π§ 12.2 Be a Compass for Risk Decisions (2:34)
π 12.3 Step 1: Widen Your Scope - Part 1 Featuring Dr. Gerald Auger! (8:21)
π 12.4 Step 1: Widen Your Scope - Part 2 (4:22)
π€ 12.5 Step 2: Get Buy In, "Winning Hearts and Minds" (7:37)
π₯ 12.6 Step 3: Select Interviewees (3:02)
ποΈ 12.7 Step 4: Generate the Questionnaire (7:06)
βοΈ 12.8 Step 4 Continued: Scoring Criteria and Question Count (7:21)
π 12.9 Spreadsheet Lab 1: Build a CSF 2.0 Profiles Template (17:05)
π 12.10 Spreadsheet Lab 2: Build Charts (25:34)
π οΈ 12.11 Spreadsheet Lab 3: Simply Cyber Con Public Workshop and Exclusive Directors Cut: How to Make a CR-MAP Scorecard That Wins Hearts and Minds (50:40)
π― 12.12 Step 5: Determine Target Scores - Featuring Dr. Gerald Auger! (5:03)
β¨ 12.13 Step 5: Determine Target Scores - Examples (4:48)
π 12.14 Step 6: Conduct the Interviews (8:17)
π 12.15 Step 7: Compile and Average the Scores (2:23)
π¬ 12.16 Step 8: Communicate Your Top 5 Cyber Risks (6:17)
π 12.17 Part 1: EXCLUSIVE TO SIMPLY CYBER ACADEMY: Analyzing Network Diagrams - Featuring Dr. Gerald Auger! (8:08)
π 12.17 Part 2: EXCLUSIVE TO SIMPLY CYBER ACADEMY: Analyzing Network Diagrams - Featuring Dr. Gerald Auger! (17:49)
π 12.19 Quiz
β 12.18 Conclusion and Touchpoints (1:53)
Chapter 13 - Phase 2: Creating a CR-MAP
ποΈ 13.1 Introduction & Exam Objectives - Featuring Simply Cyber Jaw Jacking (5:22)
π° 13.2: ASUS Responsible Disclosure Case Sudy (3:54)
π‘οΈ 13.3: Responsible Disclosure: 6 More Business Case Studies (5:48)
π 13.4: Keys to Success: Prioritization, Roles and Responsibilities, Keep It Simple - Featuring Simply Cyber Jaw Jacking (12:36)
β 13.5: Key Success Factors Continued: Controlling the Rate of Change (4:46)
π 13.6: Five Steps to Developing an Action Plan (3:29)
π§ 13.7: (Step 1) Close the Identified Gaps - Featuring Dr Gerald Auger! (7:40)
β οΈ 13.8: Backgrounder on Supply Chain Risk Management | GV.SC-01 (18:36)
π¦ 13.9: GV.SC-05 (and some GV.SC-07): Requirements to Address Cybersecurity Risks in Supply Chains (7:58)
π€ 13.10: AI Aigmented Contract Review - Fabric Demo (6:41)
π 13.11: GV.SC-07 Supply Chain Risks Understood, Recorded, Prioritized, Assessed, Responded to, and Monitored (15:03)
π οΈ 13.12: GV.SC: Example Supply Chain Risk Assessment Tools (6:57)
π 13.13: PR.AA: Identity Management, Authentication, and Access Control - Featuring Dr. Gerald Auger in the Daily Cyber Threat Briefing! (10:28)
π’ 13.14 π§ PR.AT Awareness and Training (10:31)
π’ 13.15 RS.CO: Incident Response Reporting and Communication (9:03)
π€ 13.16 (Step 1) Considerations: Cybersecurity Org Size and Design (9:15)
β 13.17 3TCO: 3-Year Total Cost of Ownership - Featuring Jason Dion in Cyber Coffee Hour! (19:50)
π‘ 13.18-Part 1: (Step 2) Business Value Analysis - Featuring Jason Dion in Cyber Coffee Hour! (9:17)
π‘ 13.18-Part 2: (Step 2) Business Value Analysis (20:13)
πΊοΈ 13.19 (Step 3) Create a Dashboard and Roadmap (4:31)
π 13.20 (Step 4) Internal Marketing Cyber Risk Scorecard Presentation (9:05)
β 13.21 Internal Marketing Key Success Factors (5:10)
π’ 13.22 (Step 5) External Marketing (2:53)
β 13.23 Conclusion & Touchpoints (1:55)
π 13.24 Quiz
Chapter 14 - Phase 3: Maintenance and Updates
ποΈ 14.1 Introduction & Exam Objectives (6:05)
π 14.2 Equifax Data Breach Case Study (8:51)
π£ 14.3 Four Steps (9:59)
π€ 14.4 AI Augmented NIST CSF Assessment - Fabric Demo (16:01)
β 14.5 Conclusion and Touchpoints (1:57)
π 14.6 Quiz
Chapter 15 - Exclusive Simply Cyber Academy Content - from Dr. Gerald Auger
π 15.1 From (the Legendary) GRC Masterclass: NIST Cybersecurity Framework (CSF) 2.0 Bonus Material (30:02)
π 15.2 Resignation Letter Template + 3 Resume Templates
π 15.3 Enterprise Risk Assessment Security Control "Rosetta Stone"
Chapter 16 - Feedback and Refer a Friend Program
π 16.1 Leave Feedback (0:06)
π« 16.2 Refer a Friend Program
Practice Exams
Practice Exam #1
Practice Exam #2
Practice Exam #3
βοΈ 11.8 Attorney-Client Privilege
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock