Companies Home Search Profile

Keep the NIST Risk Management Framework Simple

Focused View

Larry Watlington

56:12

0 View
  • 1 -Course Introduction.mp4
    05:23
  • 1 -Cybersecurity Scenario - Part 1.pptx
  • 1 -Cybersecurity Scenario - Part 2.pptx
  • 1 -RMF Step 1 System Categorization.mp4
    11:31
  • 2 -RMF Step 1 Categorization Overlays.mp4
    02:19
  • 3 -RMF Step 1 Final Categorization.mp4
    00:56
  • 4 -RMF Step 2 Selecting Controls.mp4
    05:49
  • 5 -RMF Step 3 Implementing Controls.mp4
    03:06
  • 6 -RMF Steps 1 through 3 Summary.mp4
    01:13
  • 1 -RMF Step 4 Assessing Controls.mp4
    08:14
  • 2 -RMF Step 5 Authorizing the System for Use.mp4
    07:11
  • 3 -RMF Step 6 Continuous Monitoring.mp4
    07:19
  • 1 -Bringing it All Together.mp4
    03:11
  • Description


    Risk Management Framework for Beginners

    What You'll Learn?


    • Learn NOT to take the NIST Risk Management Framework too seriously!
    • Understand Risk Management from a very practical perspective
    • Recognize that we apply RMF to many things in our daily life (like changing a Door Lock)
    • Gain a basics understanding of the 6 RMF Steps
    • Apply the Risk Based approach to a very practical, non-technical Scenario
    • Keep Cybersecurity and RMF Simple and Fun!

    Who is this for?


  • This course is designed for anyone who have been totally confused (or bored) with trying to understand RMF
  • What You Need to Know?


  • There are no experience or prerequisites required for this course.
  • More details


    Description

    This scenario is a simple example of me purchasing a new computer for my parents to demonstrate the practical application and simplicity of the Risk Management Framework (RMF). The aim is to explain RMF in a non-technical manner.

    Whether we are planning the security for a network that supports a multi-million dollar corporation or deciding how to secure the new home we just purchased, the fundamental security concepts and principles are very similar. Even though our home example is typically not as structured (unless you are really meticulous) as a business model, the fundamental approach to security has not changed since the first caveman discovered the value of a wooden club and another caveman wanted it!

    Throughout the scenario, we will cover the concepts of Risk Management as well as each of the six RMF Steps:

    1. Categorize the risks associated with the information and the system.

    2. Select the appropriate security controls to mitigate risks to an acceptable level.

    3. Implement the selected controls.

    4. Assess the implemented controls.

    5. Authorize the system for use.

    6. Continuously monitor the controls to ensure they effectively mitigate risks.

    So, forget anything you may have already learned about RMF, NIST 800-53, and most of the other technical jargon, and join me in this adventure of buying a new computer for my parents!

    Who this course is for:

    • This course is designed for anyone who have been totally confused (or bored) with trying to understand RMF

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Larry Watlington
    Larry Watlington
    Instructor's Courses
    Hi, I am Mr. Larry Watlington, of Keep Cyber Simple!I am a retired US Air Force Chief Master Sergeant with over thirty years of IT/Telecommunications and Cybersecurity experience with the Department of Defense and Defense Contractors. My background also extends into the areas of radio and satellite systems, networking as well as IT project management, acquisition and requirements analysis.My education includes Dual Masters in Cybersecurity and IT/Telecommunications Management from the University of Maryland and a bachelor’s degree in industrial technology from Southern Illinois University, Carbondale. I have earned my CISSP and Security + Certifications.I now reside in Dallas Texas with my beautiful wife, Aida where I am an Information System Security Manager (ISSM) for a major defense contractor.In addition to UDEMY, I am also an adjunct professor at ECPI University, California Baptist University and Indiana Wesleyan University.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 11
    • duration 56:12
    • Release Date 2025/01/24