Companies Home Search Profile

Implementing the NIST Risk Management Framework (RMF)

Focused View

Jason Dion • 1 Million+ Enrollments Worldwide,Dion Training Solutions • ATO for ITIL & PRINCE2,Dion Training Solutions • ATO for ITIL & PRINCE2,Kip Boyle

5:37:16

129 View
  • 1. Welcome.mp4
    10:15
  • 2.1 Implementing the NIST Risk Management Framework (RMF) Study Guide.pdf
  • 2. Download Your Free Study Guide.html
  • 1. Risk Management Framework.mp4
    02:41
  • 2. Summary of RMF.mp4
    04:20
  • 3. 7-step Process.mp4
    15:15
  • 4. SP800-37.mp4
    03:32
  • 5. RMF Version 2.mp4
    03:30
  • 6. Information Security and Privacy.mp4
    06:37
  • 7. Authorization Boundary.mp4
    11:02
  • 8. Supply Chain Risk Management (SCRM).mp4
    03:03
  • 9. Requirements Versus Controls.mp4
    03:41
  • 10. Thoughts on RMF.mp4
    12:11
  • 11. Flexibility.mp4
    04:59
  • 12. Timelines.mp4
    05:46
  • 13. Checkpoint Risk Management Framework.html
  • 1. The Seven Steps.mp4
    03:01
  • 2. Step 1 - Prepare Your Organization.mp4
    07:06
  • 3. Step 1 - Prepare Your System.mp4
    06:20
  • 4. Step 1 in the Real World.mp4
    10:09
  • 5. Step 2 - Categorize Your System.mp4
    01:57
  • 6. Step 2 in the Real World.mp4
    10:26
  • 7. Step 3 - Select Controls.mp4
    04:55
  • 8. Step 3 in the Real World.mp4
    10:54
  • 9. Step 4 - Implement Controls.mp4
    01:37
  • 10. Step 4 in the Real World.mp4
    17:48
  • 11. Step 5 - Assess Controls.mp4
    05:13
  • 12. Step 5 in the Real World.mp4
    13:17
  • 13. Step 6 - Authorize the System.mp4
    04:04
  • 14. Step 6 in the Real World.mp4
    10:41
  • 15. Step 7 - Monitor the System.mp4
    04:52
  • 16. Step 7 in the Real World.mp4
    04:35
  • 17. Checkpoint The Seven Steps.html
  • 1. Associated Topics.mp4
    01:47
  • 2. Automating RMF.mp4
    01:21
  • 3. eMASS.mp4
    09:49
  • 4. eMASS Risks.mp4
    02:22
  • 5. RMF and CSF.mp4
    04:04
  • 6. Checkpoint Associated Topics.html
  • 1. Conclusion.mp4
    04:35
  • 2. RMF in the Real World (Interview with Drew Church).mp4
    01:05:57
  • 3. Automating RMF using eMASS (Interview with Rebecca Onuskanich).mp4
    43:34
  • Description


    A practitioner's guide to using the NIST Risk Management Framework (RM) to protect your business or organization

    What You'll Learn?


    • Understand the foundations of the NIST Risk Management Framework
    • Manage organizational risk in your IT systems
    • Categorize systems and select controls to minimize risk
    • Continuously monitor control implementation and risks to the system

    Who is this for?


  • Cybersecurity Professionals
  • Information Technology Practitioners
  • Risk Management Practitioners
  • Business Leaders and Executives
  • More details


    Description

    Have you ever wondered how to actually use the NIST Risk Management Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Risk Management Framework (RMF) to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the 7-step NIST Risk Management Framework (RMF) process, including:

    • PREPARE

      • Essential activities to prepare the organization to manage security and privacy risk

    • CATEGORIZE

      • Categorize the system and information processes, stored, and transmitted based on an impact analysis

    • SELECT

      • Select the set of NIST SP 800-53 controls to protect the system based on a risk assessment

    • IMPLEMENT

      • Implement the controls and document how controls are deployed

    • ASSES

      • Assess to determine if the controls are in place, operating as intended, and producing the desired results

    • AUTHORIZE

      • The senior official makes a risk-based decision to authorize the system (to operate)

    • MONITOR

      • Continuously monitor control implementation and risks to the system


    Then, you will dive deeper into the framework to fully understand each of the seven steps, how they are applied in the real world and other considerations for using RMF and eMass in your career.

    The NIST Risk Management Framework (RMF) provides a process that integrates security, privacy, and cyber supply chain risk management activities into the system development lifecycle.


    This risk-based approach to control selection and specification considers the effectiveness, efficiency, and constraints available due to applicable laws, directives, Executive Orders, policies, standards, or regulations.


    By using the NIST Risk Management Framework (RMF), you can better manage organizational risk and ensure the success of your information security and privacy programs when operating within the government and defense industries.


    Upon completion of this course, you will earn 4 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.


    Who this course is for:

    • Cybersecurity Professionals
    • Information Technology Practitioners
    • Risk Management Practitioners
    • Business Leaders and Executives

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Jason Dion • 1 Million+ Enrollments Worldwide
    Jason Dion • 1 Million+ Enrollments Worldwide
    Instructor's Courses
    Jason Dion, CISSP No. 349867, is a former college professor and the lead instructor at Dion Training Solutions. He has multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), CySA+, Security+, Network+, A+, PRINCE2 Practitioner, and ITIL. With networking experience dating back to 1992, Jason has been a network engineer, Director of a Network Operations and Security Center, and an Information Systems Officer for large organizations around the globe. He holds a Master’s of Science degree in Information Technology with a specialization in Information Assurance. He lives in Puerto Rico with his wife and two children.
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Instructor's Courses
    Learn Faster and Get CertifiedDue to the design of our materials, you will learn faster and focus your studies on passing your certifications. With our tools and techniques, you will be ready to take and pass your certification exam on your first attempt!Training the Cybersecurity WorkforceWe strive to train the cybersecurity workforce of today and tomorrow. Whether you need to earn your next certification to be competitive for that position, or you just need to do your continuing education to maintain your current certifications, Dion Training is here to support you.
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Instructor's Courses
    Learn Faster and Get CertifiedDue to the design of our materials, you will learn faster and focus your studies on passing your certifications. With our tools and techniques, you will be ready to take and pass your certification exam on your first attempt!Training the Cybersecurity WorkforceWe strive to train the cybersecurity workforce of today and tomorrow. Whether you need to earn your next certification to be competitive for that position, or you just need to do your continuing education to maintain your current certifications, Dion Training is here to support you.
    Kip Boyle is the virtual Chief Information Security Officer (CISO) for several companies. He helps senior decision-makers overcome cybersecurity sales objections and manage unlimited cyber risks with a limited budget through rigorous prioritization. He's served as a Captain with the F-22 program in the US Air Force. In the private sectors he was the CISO for an insurance company, credit card processor, bank, credit union, and IT Managed Service Provider. He has also succeeded in other IT risk management roles in the financial services, technology, telecom, and logistics industries. He lives in Seattle with his wife and six kids.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 37
    • duration 5:37:16
    • Release Date 2023/04/27