Setup Menus in Admin Panel

Beginners will get familiarized with the concept of IT support. Everyone will learn FISMA security compliance.

Course Curriculum

Chapter 1
Chapter 1.1 How to Become a Cyber Security Analyst Details FREE 00:06:00
Chapter 1.2 What is a Network Details 00:06:00
1.2 Questions Unlimited
Chapter 1.3 Components of an Enterprise Part 1 Details 00:06:00
1.3 Questions Unlimited
Chapter 1.4 Components of an Enterprise Part 2 Details 00:06:00
1.4 Questions Unlimited
Chapter 1.5 Components of an Enterprise Network Part 3 Details 00:06:00
1.5 Questions Unlimited
Chapter 1.6 The Physical Components of a Network Part 4- Bennefits of Servers Details 00:06:00
Chapter 1.7 What is the Internet Details 00:04:00
1.7 Questions Unlimited
Chapter 1.8 The Human Component of an Enterprise Network Part 1 Details 00:05:00
1.8 Questions Unlimited
Chapter 1.9 The Human Component of an Enterprise Network Part 2 Details 00:06:00
1.9 Questions Unlimited
Chapter 1.10 THE HUMAN COMPONENT OF IT SUPPORT Details 00:06:00
1.10 Questions Unlimited
Chapter 1.11 Introduction to our Simulated Environment- Meet the IT Operations Team Details 00:06:00
1.11 Questions Unlimited
Chapter 1.12 Introduction to our simulated environment- Meet the IT Security Team Details 00:06:00
1.12 Questions Unlimited
Chapter 2
Chapter 2.1 INTRODUCTION TO SECURITY COMPLIANCE AND FISMA REQUIREMENTS Details 00:06:00
2.1 Questions Unlimited
Chapter 2.2 RMF STEP 1 – SECURITY CATEGORIZATION Details 00:05:00
2.2 Questions Unlimited
Chapter 2.3 Security Categorization Part 2 Details 00:07:00
2.3 Questions Unlimited
Chapter 2.4 RMF STEP 1- SECURITY CATEGORIZATION PART 3 Details 00:05:00
2.4 Questions Unlimited
Chapter 2.5 COMPENTS OF A SYSTEM AND TECHNICAL DESCRIPTION Details 00:05:00
2.5 Questions Unlimited
Chapter 2.6 COMPONENTS OF A SYSTEM TECHNICAL DESCRIPTION PART 2 Details 00:05:00
2.6 Questions Unlimited
Chapter 2.7 RMF STEP 2 – SELECT SECURITY CONTROLS Details 00:05:00
2.7 Questions Unlimited
Chapter 2.8 RMF STEP 3 – IMPLEMENTING SECURITY CONTROLS Details 00:05:00
2.8 Questions Unlimited
Chapter 2.9 Pep Talk-Intro to the SSP simulation Details 00:05:00
2.9 Questions Unlimited
Chapter 2.10 SSP Simulation – Editing the Cover Page Details 00:06:00
2.10 lab Unlimited
Chapter 2.11 SSP Simulation – Editing Security Categorization Details 00:06:00
2.11 Lab Unlimited
Chapter 2.12 How to Determine Your E-Authentication Level Details 00:06:00
2.12 Questions Unlimited
Chapter 2.13 SSP Simulation – Completing E-Authentication and POC Sections Details 00:06:00
2.13 lab Unlimited
Chapter 2.14 SSP Simulation – Completing the General System Description and User Types Details 00:06:00
2.14 lab Unlimited
Chapter 2.15 SSP Simulation – Describing the Network Architecture, Envrionment and Inventory Details 00:05:00
2.15 lab Unlimited
chapter 2.16 Chapter 2.16 SSP Simulation – System interconnection, Laws and regulations Details 00:06:00
2.16 lab Unlimited
Chapter 2.17 SSP Simulation – Selecting Controls-RMF STEP 2 Details 00:04:00
2.17 lab Unlimited
Chapter 2.18_SSP Simulation – Implementing the security controls_RMF Step 3 Details 00:04:00
2.18 lab Unlimited
Chapter 2.19_SSP Simulation – Implementing the security controls part 2 Details 00:00:00
2.19 lab Unlimited
Chapter 3
Chapter 3.1_RMF STEP 4 ASSESSING SECURITY CONTROLS PART 1 Details 00:10:00
3.1 Questions Unlimited
Chapter 3.2 The Security Assessment Report – From Objective to Assessment Result Details 00:13:00
3.2 Questions Unlimited
Chapter 3.3 THE SECURITY ASSESSMENT REPORT CONTD Details 00:10:00
3.3 Questions Unlimited
Chapter 3.4 RMF STEP 5 AUTHORIZE THE INFORMATION SYSTEM Details 00:08:00
3.4 Questions Unlimited
Chapter 3.5 RMF STEP 5 CONTD & RMF STEP 6 – MONITOR THE SECURITY CONTROLS Details 00:10:00
3.5 Questions Unlimited
Chapter 3.6 Asessment Simulation – Introductions and preparation for the assessment Details 00:10:00
3.6 lab Unlimited
Chapter 3.7 Sample security assessment kick off Meeting Details 00:10:00
3.7 lab Unlimited
Chapter 3.8_Security Assessment Simulation – Completing the SAR Details 00:10:00
3.8 lab Unlimited
Chapter 3.9 Assessment simulation – completing the SAR part 2 Details 00:10:00
3.9 lab Unlimited
Chapter 3.10 Security Assessment simulation – Introduction to the POA&M Details 00:10:00
3.10lab 16:39:00
Chapter 3.11 Security Assessment simulation – POA&M 1- At-3 Details 00:10:00
3.11 lab Unlimited
Chapter 3.12 Security Assessment simulation – Submit the Authorization Package (RMF Step 5) and receive the ATO Details 00:10:00
Chapter 3.13 Phase 1 Completion – Pep Talk! Details 00:10:00

Course Reviews

5

5
1 ratings
  • 5 stars1
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0
  1. phase 1 & 2

    5

    hello Paul, Thanks for taking time to produce this video and online lab. it has been very useful ane resourceful to me personally. but could you upload another video for chapter 3.8 – completing the SAR because its not opening. thanks

TAKE THIS COURSE
  • Full Subscription
  • UNLIMITED ACCESS
  • Course Badge
  • Course Certificate
16 STUDENTS ENROLLED

Advanced Course Search Widget

Recent Posts

Term : Taxonomy Mismatch: Selected Term does not exist in Taxonomy ! ..more..

X