Full course description
Format
This online, self-paced course is designed to support implementation-focused learning. Each module includes instructional video content, practical implementation exercises, knowledge assessments, and supporting resource materials to reinforce real-world application of NIST CSF 2.0 requirements.
Participants are expected to complete the full course in approximately 4 hours, though individual completion time may vary based on experience level and pace of learning.

Prerequisites
Prior knowledge of NIST CFS 2.0 is not required to take the course. However, this course provides detailed technical and operational implementation guidance across each CSF Function, Category, and Subcategory.
Participants are strongly encouraged to complete Executive-level and CSF Live Online training prior to enrolling in this course. Those programs provide strategic context and foundational understanding of CSF 2.0. To find out more visit usf.to\CyberReadyFL.
Course Overview
This course is designed for cybersecurity, risk, compliance, and operational personnel within Florida state and local government agencies, providing them with the knowledge and practical skills needed to effectively implement and sustain the NIST Cybersecurity Framework (CSF) 2.0.
Building on concepts introduced in Executive-level and CSF Live Online training, this self-paced course provides detailed, function-by-function guidance on applying CSF 2.0 using a risk-based approach. Participants will gain a comprehensive understanding of the framework’s key components and will learn how to translate CSF requirements into actionable operational practices.
Additionally, the course provides access to implementation resources and supporting documentation designed to help agencies operationalize CSF requirements and continuously improve their cybersecurity program management.
Key Takeaways
- Apply detailed implementation guidance for NIST CSF 2.0 across agency cybersecurity programs
- Interpret CSF Functions, Categories, and Subcategories and translate requirements into operational practices
- Conduct risk-based cybersecurity assessments to support compliance with Florida cybersecurity standards
- Utilize implementation resources, templates, and reference documentation to support framework deployment
- Support continuous improvement of cybersecurity governance, operations, and resilience planning
Govern Domain
-
- Implement governance structures and oversight processes aligned with CSF 2.0 requirements
- Develop and maintain cybersecurity risk management strategies and policies
- Define roles, responsibilities, and accountability for cybersecurity programs
- Integrate cybersecurity governance into enterprise risk management and leadership decision-making
Identify Domain
-
- Conduct asset inventory, classification, and data sensitivity analysis
- Identify critical systems, organizational dependencies, and business processes
- Perform risk and impact assessments using Business Continuity Management (BCM) and Business Impact Analysis (BIA) methodologies
- Establish risk prioritization and organizational cybersecurity baselines
Protect Domain
-
- Select and implement cybersecurity safeguards aligned with CSF risk assessment outcomes
- Apply preventive, detective, and corrective security control strategies
- Implement access control, data protection, and security awareness practices
- Support operational deployment of technical and administrative cybersecurity controls
Detect Domain
-
- Implement continuous monitoring and threat detection capabilities
- Develop processes for identifying anomalies and potential cybersecurity events
- Apply event analysis and reporting procedures
- Integrate detection activities into incident response and risk management processes
Respond Domain
-
- Develop and implement incident response procedures and communication strategies
- Apply containment, mitigation, and coordination processes during cybersecurity incidents
- Conduct incident analysis to determine scope, impact, and root cause
- Support collaboration with internal teams and external partners during response efforts
Recover Domain
-
- Implement recovery planning and system restoration procedures
- Validate system integrity and operational readiness following cybersecurity incidents
- Apply lessons learned to strengthen cybersecurity controls and resilience strategies
- Communicate recovery progress, operational impacts, and improvement measures to stakeholders
Who Should Attend?
This course is intended for personnel within Florida state and local government agencies who are responsible for implementing, managing, and supporting compliance with state law requiring the use of NIST compliant standards. Building on the strategic and foundational knowledge introduced in Executive-level Cybersecurity training and CSF Live Online training, this course is designed for individuals and teams actively involved in operational cybersecurity and risk management activities.
The Department of Homeland Security recommends participation from cross-functional personnel representing business, operational, security, information technology, and maintenance functions to support effective framework implementation. This course is particularly beneficial for individuals responsible for developing, executing, monitoring, and maintaining cybersecurity programs and controls, including:
- IT Security and Cybersecurity Operations Personnel
- Agency Risk Managers
- Compliance Officers and Compliance Managers
- IT Policy and Governance Personnel
- Business Continuity and Disaster Recovery Planning Teams
- Internal Audit Personnel
- IT Infrastructure and IT Operations Staff
- Procurement and Vendor Risk Management Personnel
- Chief Privacy Officers and Data Protection Officers
- Legal and Regulatory Compliance Personnel
- Business and Operational Managers supporting cybersecurity implementation initiatives
Completion
Upon successful course completion, participants receive a USF digital badge as recognition of their training. Participants can showcase this certificate on their professional profiles, such as LinkedIn.

