NICE Framework Mapping
Cyberspace Effects (CE), Investigation (IN), Implementation and Operation (IO), Oversight and Governance (OG), Protection and Defense (PD)
Overview
This course offers a comprehensive exploration of the Risk Management Framework (RMF) tailored specifically for Joint Special Access Program (SAP) implementation, providing participants with the necessary knowledge and skills to effectively manage and mitigate risks to sensitive information and information systems. Through a series of interactive lessons, participants will delve into the background, purpose, and key principles of RMF, while also gaining insights into cyber threats, security controls selection, implementation, and continuous monitoring. Practical guidance, case studies, and real-world examples will be provided to enhance understanding and application of RMF within the context of JSIG requirements.
Prerequisites
Basic understanding of information security principles and concepts
Familiarity with fundamental principles of risk management
Prior experience in a technical or security-related role is recommended but not required
Schedule
4 Days
Outline
Lesson 1: Background & Purpose
Lesson 2: Cyber Security and Threats to Information & Information Systems
Lesson 3: Risk Management Framework Overview, Roles and Responsibilities
Lesson 4: Steps in the RMF Process
Lesson 5: Step 0 Prepare
Lesson 6: Step 1 Categorize Information System
Lesson 7: Step 2 Select Security Controls
Lesson 8: Step 3 Implement Security Controls
Lesson 9: Step 4 Assess Security Controls
Lesson 10: Step 5 Security Authorization
Lesson 11: Step 6 Continuous Monitoring
Lesson 12: Monitoring Isolated Networks
Lesson 13: Security Assessments, Authorization Artifacts and Body Of Evidence (BOE)
Lesson 14: Other Processes and Frameworks: FedRAMP & CMMC
Lesson 15: Security Features (Technical/Non-Technical)
Lesson 16: Tips, Tricks, Tools and Best Practices
Sign Up Today
If you are interested in this training email provide your information below.