Course

Cybersecurity Framework 2.0 On Demand, Practitioner Course

Self-paced

Enroll

Full course description

Format 

This online, self-paced course is designed to support implementation-focused learning. Each module includes instructional video content, practical implementation exercises, knowledge assessments, and supporting resource materials to reinforce real-world application of NIST CSF 2.0 requirements. 

Participants are expected to complete the full course in approximately 4 hours, though individual completion time may vary based on experience level and pace of learning.

USF CybersecurityBadge

Prerequisites

Prior knowledge of NIST CFS 2.0 is not required to take the course. However, this course provides detailed technical and operational implementation guidance across each CSF Function, Category, and Subcategory.

Participants are strongly encouraged to complete Executive-level and CSF Live Online training prior to enrolling in this course. Those programs provide strategic context and foundational understanding of CSF 2.0. To find out more visit usf.to\CyberReadyFL.

Course Overview

This course is designed for cybersecurity, risk, compliance, and operational personnel within Florida state and local government agencies, providing them with the knowledge and practical skills needed to effectively implement and sustain the NIST Cybersecurity Framework (CSF) 2.0.

Building on concepts introduced in Executive-level and CSF Live Online training, this self-paced course provides detailed, function-by-function guidance on applying CSF 2.0 using a risk-based approach. Participants will gain a comprehensive understanding of the framework’s key components and will learn how to translate CSF requirements into actionable operational practices.

Additionally, the course provides access to implementation resources and supporting documentation designed to help agencies operationalize CSF requirements and continuously improve their cybersecurity program management.

Key Takeaways

  • Apply detailed implementation guidance for NIST CSF 2.0 across agency cybersecurity programs
  • Interpret CSF Functions, Categories, and Subcategories and translate requirements into operational practices
  • Conduct risk-based cybersecurity assessments to support compliance with Florida cybersecurity standards
  • Utilize implementation resources, templates, and reference documentation to support framework deployment
  • Support continuous improvement of cybersecurity governance, operations, and resilience planning

 

Govern Domain

    • Implement governance structures and oversight processes aligned with CSF 2.0 requirements
    • Develop and maintain cybersecurity risk management strategies and policies
    • Define roles, responsibilities, and accountability for cybersecurity programs
    • Integrate cybersecurity governance into enterprise risk management and leadership decision-making

Identify Domain

    • Conduct asset inventory, classification, and data sensitivity analysis
    • Identify critical systems, organizational dependencies, and business processes
    • Perform risk and impact assessments using Business Continuity Management (BCM) and Business Impact Analysis (BIA) methodologies
    • Establish risk prioritization and organizational cybersecurity baselines

Protect Domain

    • Select and implement cybersecurity safeguards aligned with CSF risk assessment outcomes
    • Apply preventive, detective, and corrective security control strategies
    • Implement access control, data protection, and security awareness practices
    • Support operational deployment of technical and administrative cybersecurity controls

Detect Domain

    • Implement continuous monitoring and threat detection capabilities
    • Develop processes for identifying anomalies and potential cybersecurity events
    • Apply event analysis and reporting procedures
    • Integrate detection activities into incident response and risk management processes

Respond Domain

    • Develop and implement incident response procedures and communication strategies
    • Apply containment, mitigation, and coordination processes during cybersecurity incidents
    • Conduct incident analysis to determine scope, impact, and root cause
    • Support collaboration with internal teams and external partners during response efforts

Recover Domain

    • Implement recovery planning and system restoration procedures
    • Validate system integrity and operational readiness following cybersecurity incidents
    • Apply lessons learned to strengthen cybersecurity controls and resilience strategies
    • Communicate recovery progress, operational impacts, and improvement measures to stakeholders

 

Who Should Attend?

This course is intended for personnel within Florida state and local government agencies who are responsible for implementing, managing, and supporting compliance with state law requiring the use of NIST compliant standards. Building on the strategic and foundational knowledge introduced in Executive-level Cybersecurity training and CSF Live Online training, this course is designed for individuals and teams actively involved in operational cybersecurity and risk management activities.

The Department of Homeland Security recommends participation from cross-functional personnel representing business, operational, security, information technology, and maintenance functions to support effective framework implementation. This course is particularly beneficial for individuals responsible for developing, executing, monitoring, and maintaining cybersecurity programs and controls, including:

  • IT Security and Cybersecurity Operations Personnel
  • Agency Risk Managers
  • Compliance Officers and Compliance Managers
  • IT Policy and Governance Personnel
  • Business Continuity and Disaster Recovery Planning Teams
  • Internal Audit Personnel
  • IT Infrastructure and IT Operations Staff
  • Procurement and Vendor Risk Management Personnel
  • Chief Privacy Officers and Data Protection Officers
  • Legal and Regulatory Compliance Personnel
  • Business and Operational Managers supporting cybersecurity implementation initiatives

 

Completion

Upon successful course completion, participants receive a USF digital badge as recognition of their training. Participants can showcase this certificate on their professional profiles, such as LinkedIn.

Sign up for this course today!

Enroll