Beginners will get familiarized with the concept of IT support. Everyone will learn FISMA security compliance.

This course will get you familiarized with basic IT terminologies and concepts.

After learning foundation IT concepts, you will learn the process to make a network FISMA compliant. We will do this using the Risk management Framework (RMF) for guidance.

Think of FISMA compliance as the documentation side of Information Security (aka Cybersecurity Policy). FISMA compliance is a requirement for all networks that hold government data.

Learning this skill alone can provide you with a lucrative career!

Course Curriculum

Chapter 1
Chapter 1.1 How to Become a Cyber Security Analyst Details FREE 00:06:00
Chapter 1.2 What is a Network Details 00:06:00
1.2 Questions Unlimited
Chapter 1.3 Components of an Enterprise Part 1 Details 00:06:00
1.3 Questions Unlimited
Chapter 1.4 Components of an Enterprise Part 2 Details 00:06:00
1.4 Questions Unlimited
Chapter 1.5 Components of an Enterprise Network Part 3 Details 00:06:00
1.5 Questions Unlimited
Chapter 1.6 The Physical Components of a Network Part 4- Bennefits of Servers Details 00:06:00
Chapter 1.7 What is the Internet Details 00:04:00
1.7 Questions Unlimited
Chapter 1.8 The Human Component of an Enterprise Network Part 1 Details 00:05:00
1.8 Questions Unlimited
Chapter 1.9 The Human Component of an Enterprise Network Part 2 Details 00:06:00
1.9 Questions Unlimited
Chapter 1.10 THE HUMAN COMPONENT OF IT SUPPORT Details 00:06:00
1.10 Questions Unlimited
Chapter 1.11 Introduction to our Simulated Environment- Meet the IT Operations Team Details 00:06:00
1.11 Questions Unlimited
Chapter 1.12 Introduction to our simulated environment- Meet the IT Security Team Details 00:06:00
1.12 Questions Unlimited
Chapter 2
Chapter 2.1 INTRODUCTION TO SECURITY COMPLIANCE AND FISMA REQUIREMENTS Details 00:06:00
2.1 Questions Unlimited
Chapter 2.2 RMF STEP 1 – SECURITY CATEGORIZATION Details 00:05:00
2.2 Questions Unlimited
Chapter 2.3 Security Categorization Part 2 Details 00:07:00
2.3 Questions Unlimited
Chapter 2.4 RMF STEP 1- SECURITY CATEGORIZATION PART 3 Details 00:05:00
2.4 Questions Unlimited
Chapter 2.5 COMPENTS OF A SYSTEM AND TECHNICAL DESCRIPTION Details 00:05:00
2.5 Questions Unlimited
Chapter 2.6 COMPONENTS OF A SYSTEM TECHNICAL DESCRIPTION PART 2 Details 00:05:00
2.6 Questions Unlimited
Chapter 2.7 RMF STEP 2 – SELECT SECURITY CONTROLS Details 00:05:00
2.7 Questions Unlimited
Chapter 2.8 RMF STEP 3 – IMPLEMENTING SECURITY CONTROLS Details 00:05:00
2.8 Questions Unlimited
Chapter 2.9 Pep Talk-Intro to the SSP simulation Details 00:05:00
2.9 Questions Unlimited
Chapter 2.10 SSP Simulation – Editing the Cover Page Details 00:06:00
2.10 lab Unlimited
Chapter 2.11 SSP Simulation – Editing Security Categorization Details 00:06:00
2.11 Lab Unlimited
Chapter 2.12 How to Determine your Digital Identity Levels – Part 1 Details 00:06:00
The process to determine the level of security placed on your digital identity is quite detailed, but once you understand it, it’s pretty easy to follow. Digital identity considers three different identity categories. These categories are: • IAL • AAL • FAL
2.12 Questions Unlimited
Chapter 2.12.1 How to Determine your Digital Identity Levels – Part 2 Details 00:00:00
In the last video you had learned how to determine your Identity Assurance Level. Now let’s find out what each of the three levels mean. Table 4-1 of the NIST Publication 800-63-3 has a good summary chart of what is required for each IAL. I will give you a high level of each.
Chapter 2.12.2 How to Determine your Digital Identity Levels – Part 3 Details 00:00:00
And now for the last piece of our digital identity puzzle, FAL. This stands for Federal Assurance Level. In case you forgot the definition, here is is again. This category is listed as optional because it is generally used when the relying party (RP) and the identity provider (IdP) are sperate entities. The relying party is the location where the authenticator is used. And an identity provider is the one who makes the authenticator.
Chapter 2.13 SSP Simulation – Completing E-Authentication and POC Sections Details 00:06:00
2.13 lab Unlimited
Chapter 2.13.1 SSP Simulation – Completing POC Sections Details 00:00:00
• Let’s move on to section 3 shall we… We will fill out the system owner information on table 3-1. We know this information, so I will enter it here.
Chapter 2.14 SSP Simulation – Completing the General System Description and User Types Details 00:06:00
2.14 lab Unlimited
Chapter 2.15 SSP Simulation – Describing the Network Architecture, Envrionment and Inventory Details 00:05:00
2.15 lab Unlimited
chapter 2.16 Chapter 2.16 SSP Simulation – System interconnection, Laws and regulations Details 00:06:00
2.16 lab Unlimited
Chapter 2.17 SSP Simulation – Selecting Controls-RMF STEP 2 Details 00:04:00
2.17 lab Unlimited
Chapter 2.18_SSP Simulation – Implementing the security controls_RMF Step 3 Details 00:04:00
2.18 lab Unlimited
Chapter 2.19_SSP Simulation – Implementing the security controls part 2 Details 00:00:00
2.19 lab Unlimited
Chapter 3
Chapter 3.1_RMF STEP 4 ASSESSING SECURITY CONTROLS PART 1 Details 00:10:00
3.1 Questions Unlimited
Chapter 3.2 The Security Assessment Report – From Objective to Assessment Result Details 00:13:00
3.2 Questions Unlimited
Chapter 3.3 THE SECURITY ASSESSMENT REPORT CONTD Details 00:10:00
3.3 Questions Unlimited
Chapter 3.4 RMF STEP 5 AUTHORIZE THE INFORMATION SYSTEM Details 00:08:00
3.4 Questions Unlimited
Chapter 3.5 RMF STEP 5 CONTD & RMF STEP 6 – MONITOR THE SECURITY CONTROLS Details 00:10:00
3.5 Questions Unlimited
Chapter 3.6 Asessment Simulation – Introductions and preparation for the assessment Details 00:10:00
3.6 lab Unlimited
Chapter 3.7 Sample security assessment kick off Meeting Details 00:10:00
3.7 lab Unlimited
Chapter 3.8_Security Assessment Simulation – Completing the SAR Details 00:10:00
Chapter 3.9 Assessment simulation – completing the SAR part 2 Details 00:10:00
3.9 lab Unlimited
Chapter 3.10 Security Assessment simulation – Introduction to the POA&M Details 00:10:00
3.10lab 16:39:00
Chapter 3.11 Security Assessment simulation – POA&M 1- At-3 Details 00:10:00
3.11 lab Unlimited
Chapter 3.12 Security Assessment simulation – Submit the Authorization Package (RMF Step 5) and receive the ATO Details 00:10:00
Chapter 3.13 Phase 1 Completion – Pep Talk! Details 00:10:00

Course Reviews

5

5
1 ratings
  • 5 stars1
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0
  1. phase 1 & 2

    5

    hello Paul, Thanks for taking time to produce this video and online lab. it has been very useful ane resourceful to me personally. but could you upload another video for chapter 3.8 – completing the SAR because its not opening. thanks

About Us

A comprehensive online course unlike any out there in the industry. We teach you information security from the ground up. Our training program takes you from learning theories and concept to real world scenarios that you can visualize and apply. In addition to the on-demand learning, you also have the option to receive one on one mentorship online. Our mentors will help you gain experience by engaging with real-world projects.

X