
What You'll Learn
Competencies
✓ Develop and implement advanced resilience strategies to mitigate complex cyber risks
✓ Assess and prioritize cybersecurity threats and vulnerabilities across diverse business environments
✓ Apply the NIST Cybersecurity Framework to create actionable resilience plans
✓ Align cyber resilience initiatives with organizational objectives and business continuity goals
✓ Communicate detailed risk assessments and resilience strategies effectively to stakeholders and leadership
Where These Skills Can Take You
Job Roles
Disclaimer: Salary ranges represent estimates based on current market data. Individual compensation may vary based on experience, location, and economic factors. This information alone does not guarantee specific salary levels or employment.
Source: Indeed.com Cybersecurity Salary Guide
A/CRMP - AKYLADE Certified Cyber Resilience Practitioner
💼 Cybersecurity Analyst $75,000 - $120,000 View job listings 🔗
💼 IT Security Consultant $90,000 - $150,000 View job listings 🔗
💼 Compliance Lead $100,000 - $160,000 View job listings 🔗
💼 Security Engineer $95,000 - $160,000 View job listings 🔗
💼 SOC Manager $120,000 - $180,000 View job listings 🔗
💼 CISO $165,000 - $375,000 View job listings 🔗
What to Expect
👇

Includes 3 Hours with Dr. Gerald Auger! ⭐
Including exclusive content only in Simply Cyber Academy

Learn to Create Cyber Risk Management Action Plans 🧭
- Conduct comprehensive interviews, analyze network diagrams, and identify top organizational cyber risks using data-driven methods
- Develop custom mitigations, create implementation roadmaps, and establish cost-effective cybersecurity strategies
A/CCRP CERTIFICATION DOMAINS
📘 Cyber Risk Management Action Plan Fundamentals
Foundation knowledge of the Cyber Risk Management Action Plan process
- Assessment preparation and organizational understanding
- Cyber Risk Management Action Plan process comprehension
- Management coordination and organizational buy-in
- NIST CSF 2.0 and Cyber Risk Management Action Plan relationship
- Risk profile establishment
🔍 Phase One: Determine Top Cyber Risks
Comprehensive risk discovery and analysis using rigorous prioritization methods
- Stakeholder identification and interview planning
Conducting unbiased interviews and data collection - Network diagram analysis for risk identification
- Data gap assessment and remediation
- Top cyber risks reporting and presentation
- Custom questionnaire generation
- Visual risk communication through charts
- Target score setting and NIST alignment
📝 Phase Two: Creating a Management Action Plan
Development of personalized cybersecurity risk management strategies
- Risk coverage verification through mitigation roadmaps
- Business value assessment using the Business Value Model
- Custom mitigation development based on organizational needs
- Standard Operating Procedures (SOPs) creation
- Cost estimation for mitigations and controls
- Implementation roadmap and Gantt chart development
🛠️ Phase Three: Maintenance and Updates
Ongoing maintenance and continuous improvement of cybersecurity posture
- Leadership assistance in mitigation assignment
- Updated risk presentations as controls are implemented
- Mitigation and control explanation and accomplishments
- Ongoing reviews and cyber resiliency maintenance

Curriculum
- 0.1 Become an AKYLADE Certified Cyber Resilience Practitioner (1:11)
- 0.2 Welcome to the Course! (10:31)
- 0.3 How to Access Course Resources (3:17)
- 0.4 Lesson Components
- 0.5 What to Expect on Exam Day (3:26)
- 0.6 Exam Readiness: More Tips
- 0.7 Resume Bullets Unlocked
- 0.8 New Lessons Added! Exclusive to Simply Cyber Academy (4:04)
- 0.9 Current Simply Cyber Discount Code for AKYLADE Exam Vouchers
- 11.1 Introduction & Exam Objectives (8:27)
- 11.2 The CR-MAP Process - ⭐ ft. Dr. Gerald Auger (10:40)
- 11.3 CR-MAP Process Phase 1 Primer: Discover Your Top Cyber Risks (5:59)
- 11.4 CR-MAP Process Phase 2 Primer: Create Your Action Plan (6:49)
- 11.5 CR-MAP Process Phase 3 Primer: Maintenance and Updates (2:51)
- 11.6 The Five Questions (2:34)
- 11.7 Fostering Security Culture (9:05)
- 11.8 Attorney-Client Privilege (2:47)
- 11.9 Conclusion and Touchpoints (2:19)
- 11.10 Quiz
- 12.1 Introduction & Exam Objectives (5:02)
- 12.2 Be a Compass for Risk Decisions (2:34)
- 12.3 Step 1: Widen Your Scope - Part 1 - ⭐ ft. Dr. Gerald Auger (16:42)
- 12.4 Step 1: Widen Your Scope - Part 2 (4:22)
- 12.5 Step 2: Get Buy In, "Winning Hearts and Minds" (7:37)
- 12.6 Step 3: Select Interviewees (3:02)
- 12.7 Step 4: Generate the Questionnaire (7:06)
- 12.8 Step 4 Continued: Scoring Criteria and Question Count (14:42)
- 12.9 Spreadsheet Lab: How to Make a CR-MAP Scorecard That Wins Hearts and Minds (44:40)
- 12.10 Step 5: Determine Target Scores - ⭐ ft. Dr. Gerald Auger (5:03)
- 12.11 Step 5: Determine Target Scores - Examples (4:48)
- 12.12 Step 6: Conduct the Interviews (8:17)
- 12.13 Step 7: Compile and Average the Scores (2:23)
- 12.14 Step 8: Communicate Your Top 5 Cyber Risks (6:17)
- 12.15 Conclusion and Touchpoints (1:53)
- 12.16 Mastering Cyber Resilience Textbook Chapter 12 Quiz
- 12.17 Analyzing Network Diagrams Part 1 - ⭐ ft. Dr. Gerald Auger (8:08)
- 12.18 Analyzing Network Diagrams Part 2 - ⭐ ft. Dr. Gerald Auger (9:51)
- 13.1 Introduction & Exam Objectives - Featuring Simply Cyber Jaw Jacking (5:22)
- 13.2: ASUS Responsible Disclosure Case Study (3:54)
- 13.3: Responsible Disclosure: 6 More Business Case Studies (5:48)
- 13.4: Keys to Success: Prioritization, Roles and Responsibilities, Keep It Simple - Featuring Simply Cyber Jaw Jacking (12:36)
- 13.5: Key Success Factors Continued: Controlling the Rate of Change (4:46)
- 13.6: Five Steps to Developing an Action Plan (3:29)
- 13.7: (Step 1) Close the Identified Gaps - ⭐ ft. Dr. Gerald Auger (7:40)
- 13.8.1: Backgrounder on Supply Chain Risk Management | GV.SC-01 (18:36)
- 13.8.2.1 Learn How to Assess Third Party Risk (GRC Skills) - TryHackMe Nod, Magnificent 7 and More (8:12)
- 13.8.2.2 Governance and Why Policies Matter (7:07)
- 13.8.2.3 Top 2 Spreadsheet Skills for Data Analysis: XLOOKUP and Pivot Tables (3:26)
- 13.8.2.4 Security Questionnaire: PR.DA Protecting Data in Transit and at Rest (7:13)
- 13.8.2.5 Security Questionnaire: PR.AA-05 Access Permissions, ID.AM-8 Data Lifecycle (6:02)
- 13.9: GV.SC-05 (and some GV.SC-07): Requirements to Address Cybersecurity Risks in Supply Chains (7:58)
- 13.10: AI Augmented Contract Review - Fabric Demo (6:41)
- 13.11: GV.SC-07 Supply Chain Risks Understood, Recorded, Prioritized, Assessed, Responded to, and Monitored (15:03)
- 13.12: GV.SC: Example Supply Chain Risk Assessment Tools (6:57)
- 13.13: PR.AA: Identity Management, Authentication, and Access Control - ⭐ ft. Dr. Gerald Auger in the Daily Cyber Threat Briefing (10:28)
- 13.14 🧠 PR.AT Awareness and Training (10:31)
- 13.15 RS.CO: Incident Response Reporting and Communication (9:03)
- 13.16 (Step 1) Considerations: Cybersecurity Org Size and Design (9:15)
- 13.17 3TCO: 3-Year Total Cost of Ownership - ⭐ ft. Jason Dion in Cyber Coffee Hour (19:50)
- 13.18-Part 1: (Step 2) Business Value Analysis - ⭐ ft. Jason Dion in Cyber Coffee Hour (9:17)
- 13.18-Part 2: (Step 2) Business Value Analysis (20:13)
- 13.19 (Step 3) Create a Dashboard and Roadmap (4:31)
- 13.20 (Step 4) Internal Marketing Cyber Risk Scorecard Presentation (9:05)
- 13.21 Internal Marketing Key Success Factors (5:10)
- 13.22 (Step 5) External Marketing (2:53)
- 13.23 Conclusion & Touchpoints (1:55)
- 13.24 Quiz
- 14.1 Introduction & Exam Objectives (6:05)
- 14.2 Equifax Data Breach Case Study (8:51)
- 14.3 AI Augmented NIST CSF Assessment (9:40)
- 14.4 Four Steps (9:59)
- 14.5: AI Augmented Risk Assessments - ⭐ ft. Dr. Gerald Auger (37:04)
- 14.6 Conclusion and Touchpoints (1:57)
- 14.7 Quiz
- 14.8 (Outside Exam Scope): How to Install The Fabric Client (16:23)
- 15.1 CSF Profile Assessment Database (24:52)
- 15.2 Open Source Cybersecurity Framework (CSF) Assessment Tool - Pointy Clicky How to Install Demo (3:03)
- 15.3 CSF Profile Assessment Excel Workbook - Data Analysis Techniques (8:41)
- 15.4 Securing Growth: Alma Security Business Case Study (7:17)
- 15.5 Enterprise Risk Assessment Security Control "Rosetta Stone"
- 15.6 NEW version 1.1: Enterprise Risk Assessment Rosetta Stone - Audit Procedures (6:46)
- 15.7 ERA Rosetta Stone: ID.AM-01, 02 Asset Management (9:46)
- 15.8 ERA Rosetta Stone: ID.IM-02 Improvement (8:14)
- 15.9 ERA Rosetta Stone: ID.AU-02 Event Logging (6:04)
- 15.10 ERA Rosetta Stone: RS.MA-05 Incident Management (4:19)
- 15.11 ERA Rosetta Stone: RC.RP-03 Incident Recovery Plan Execution (6:15)
- 15.12 From (the Legendary) GRC Masterclass: NIST Cybersecurity Framework (CSF) 2.0 Bonus Material (30:02)
- 15.13 Resignation Letter Template + 3 Resume Templates
About Your Instructor, Steve McMichael, CCRP
Instructor Steve McMichael is committed to helping YOU accelerate your cybersecurity career.
Steve is passionate about guiding students, from backgrounds as diverse as accounting, into cybersecurity GRC. He successfully made this transition himself and shares how you can do it too in the popular blog, CPA to Cybersecurity. Exam prep courses for the AKYLADE Certified Cyber Resilience Fundamentals (A/CCRF), AKYLADE Certified Cyber Resilience Practitioner (A/CCRP) amd AKYLADE Certified Risk Management Foundations (A/CRMF) can help accelerate that journey.
Steve holds advanced degrees in business (BBA, MBA), along with top cybersecurity certifications (CCRP, CRMP, CISSP, CISA), and is a Chartered Professional Accountant (CPA). With nearly 20 years of experience in tech, he currently serves as Director of Governance, Risk, and Compliance at BlackBerry.

Even More Simply Cyber Academy GRC Courses
Simply Cyber Academy is tailored to empower those seeking a rewarding career in GRC cybersecurity.