NICE Framework Mapping
Cyberspace Effects (CE), Cyberspace Intelligence (CI), Investigation (IN), Implementation and Operation (IO), Oversight and Governance (OG), Protection and Defense (PD)
Overview
This course is designed to provide participants with a comprehensive understanding of the Risk Management Framework (RMF) tailored for the U.S. Army environment. Participants will explore the background, purpose, and key principles of RMF, focusing specifically on its application within the context of Army information systems and networks. Through a series of interactive lessons, participants will learn about identifying risks, vulnerabilities, and threats, as well as the roles and responsibilities involved in RMF implementation. Practical guidance, case studies, and real-world examples will be provided to enhance understanding and application of RMF processes, including steps for categorizing information systems, selecting and implementing security controls, and continuous monitoring. The course will also cover relevant Army-specific frameworks and tools, such as Army 2.0 and the use of eMASS for RMF documentation and management.
Prerequisites
Basic understanding of information security principles and concepts
Familiarity with fundamental principles of risk management
Prior experience in a technical or security-related role is recommended but not required
Schedule
4 Days
Outline
Lesson 1: Background & Purpose
Lesson 2: Risks, Vulnerabilities, Threats
Lesson 3: RMF Overview, Roles and Responsibilities
Lesson 4: Army 2.0
Lesson 5: Steps in the RMF Process with eMASS
Lesson 6: Step 0 Prepare
Lesson 7: Step 1 Categorize Information System
Lesson 8: Step 2 Select Security Controls
Lesson 9: Step 3 Implement Security Controls
Lesson 10: Step 4 Assess Security Controls
Lesson 11: Step 5 Security Authorization
Lesson 12: Step 6 Continuous Monitoring
Lesson 13: Monitoring Isolated Networks
Lesson 14: Security Assessments, Authorization Artifacts and Body Of Evidence (BOE)
Lesson 15: Other Processes and Frameworks: FedRAMP & CMMC
Lesson 16: Security Features (Technical/Non-Technical)
Lesson 17: Tips, Tricks, Tools and Best Practices
Sign Up Today
If you are interested in this training provide your information below.