Risk Management Framework for Federal Systems Training
|Commitment||4 days, 7-8 hours a day.|
|How To Pass||Pass all graded assignments to complete the course.|
|User Ratings||Average User Rating 4.8 See what learners said|
|Delivery Options||Instructor-Led Onsite, Online, and Classroom Live|
Risk Management Framework for Federal Systems Training Course – Hands-on
Federal Information Security Modernization Act (FISMA 2014)/NIST training provides students with a fundamental knowledge of the requirements for meeting FISMA requirements, as well as an in-depth look of the Federal system authorization process and Risk Management Framework (RMF).
This hands-on Risk Management Framework for Federal Systems Training equips the students with an in-depth indoctrination into the RMF and they will learn the requirements for managing risk, and ensuring that the confidentiality, availability and integrity of federal information and information systems is protected at a level commensurate with the security requirements of the information and the information system.
With Risk Management Framework for Federal Systems Training, students will participate in a series of scenario-based hands-on exercises to enhance understanding of the processes used for system authorization, including all of the elements of the Risk Management Framework. These exercises will include the development of Systems Security Plans (SSPs), Security Assessment Reports (SARs), and Plans Of Action and Milestones (POA&Ms) for Federal Information Systems. The fourth day of the FISMA/ NIST Risk Management Framework for Federal Systems Training Intensity course provides each student with a hands on experience in using automated vulnerability assessment and other tools used to support the Federal authorization process.
Risk Management Framework for Federal Systems Training Course – Customize it
- We can adapt this training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Risk Management Framework for Federal Systems Training course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the training around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Risk Management Framework for Federal Systems Training course in manner understandable to lay audiences.
Risk Management Framework for Federal Systems Training Course – Audience/Target Group
The target audience for this training course:
- System engineers
- System architects
- Executives and leaders
- CIO’s managers
- Senior IT managers
Risk Management Framework for Federal Systems Training Course – Class Prerequisites
The knowledge and skills that a learner must have before attending this training course are:
- Risk Management Framework for Federal Systems Overview
Risk Management Framework for Federal Systems Training Course – Objectives:
Upon completing this training course, learners will be able to meet these objectives:
- Manage multiple AWS accounts for your organization
- Connect on-premises datacenter to AWS cloud
- Discuss billing implications of connecting multi-region VPCs
- Move large data from on-premises datacenter to AWS
- Design large datastores for AWS cloud
- Understand different architectural designs for scaling a large website
- Protect your infrastructure from DDoS attack
- Secure your data on AWS with encryption
- Design protection of data-at-rest as well as data-in-flight
- Enhance the performance of your solutions
Risk Management Framework for Federal Systems Training – Course Content
- Module 1: Critical Definitions and Policies
- Module 2: C&A Transformation/Transition Overview
- Module 3: The IC and the Transformation
- Module 4: Roles & Responsibilities
- Module 5: Accreditation Boundary
- Module 6: System Categorization
- Module 7: Select Security Controls
- Module 8: Implement, Document & Assess Security Controls
- Module 9: Authorize Information System
- Module 10: Monitor Information System
- Module 11: Reciprocity
- Module 12: Supporting Tools
- Module 13: Certification Testing