Beginners will get familiarized with the concept of IT support. Everyone will learn FISMA security compliance.

We kick this phase off by catering to beginners. We will get you familiarized with basic IT terminologies and concepts.

After learning foundation IT concepts, you will learn the process to make a network FISMA compliant. We will do this using the Risk management Framework (RMF) for guidance.

Think of FISMA compliance as the documentation side of Information Security (aka Cybersecurity Policy). FISMA compliance is a requirement for all networks that hold government data.

Learning this skill alone can provide you with a lucrative career!

Course Curriculum

Chapter 1
Chapter 1.1 How to Become a Cyber Security Analyst Details FREE 00:06:00
Chapter 1.2 What is a Network Details 00:06:00
1.2 Questions Unlimited
Chapter 1.3 Components of an Enterprise Part 1 Details 00:06:00
1.3 Questions Unlimited
Chapter 1.4 Components of an Enterprise Part 2 Details 00:06:00
1.4 Questions Unlimited
Chapter 1.5 Components of an Enterprise Network Part 3 Details 00:06:00
1.5 Questions Unlimited
Chapter 1.6 The Physical Components of a Network Part 4- Bennefits of Servers Details 00:06:00
Chapter 1.7 What is the Internet Details 00:04:00
1.7 Questions Unlimited
Chapter 1.8 The Human Component of an Enterprise Network Part 1 Details 00:05:00
1.8 Questions Unlimited
Chapter 1.9 The Human Component of an Enterprise Network Part 2 Details 00:06:00
1.9 Questions Unlimited
Chapter 1.10 THE HUMAN COMPONENT OF IT SUPPORT Details 00:06:00
1.10 Questions Unlimited
Chapter 1.11 Introduction to our Simulated Environment- Meet the IT Operations Team Details 00:06:00
1.11 Questions Unlimited
Chapter 1.12 Introduction to our simulated environment- Meet the IT Security Team Details 00:06:00
1.12 Questions Unlimited
Chapter 2
Chapter 2.1 INTRODUCTION TO SECURITY COMPLIANCE AND FISMA REQUIREMENTS Details 00:06:00
2.1 Questions Unlimited
Chapter 2.2 RMF STEP 1 – SECURITY CATEGORIZATION Details 00:05:00
2.2 Questions Unlimited
Chapter 2.3 Security Categorization Part 2 Details 00:07:00
2.3 Questions Unlimited
Chapter 2.4 RMF STEP 1- SECURITY CATEGORIZATION PART 3 Details 00:05:00
2.4 Questions Unlimited
Chapter 2.5 COMPENTS OF A SYSTEM AND TECHNICAL DESCRIPTION Details 00:05:00
2.5 Questions Unlimited
Chapter 2.6 COMPONENTS OF A SYSTEM TECHNICAL DESCRIPTION PART 2 Details 00:05:00
2.6 Questions Unlimited
Chapter 2.7 RMF STEP 2 – SELECT SECURITY CONTROLS Details 00:05:00
2.7 Questions Unlimited
Chapter 2.8 RMF STEP 3 – IMPLEMENTING SECURITY CONTROLS Details 00:05:00
2.8 Questions Unlimited
Chapter 2.9 Pep Talk-Intro to the SSP simulation Details 00:05:00
2.9 Questions Unlimited
Chapter 2.10 SSP Simulation – Editing the Cover Page Details 00:06:00
2.10 lab Unlimited
Chapter 2.11 SSP Simulation – Editing Security Categorization Details 00:06:00
2.11 Lab Unlimited
Chapter 2.12 How to Determine Your E-Authentication Level Details 00:06:00
2.12 Questions Unlimited
Chapter 2.13 SSP Simulation – Completing E-Authentication and POC Sections Details 00:06:00
2.13 lab Unlimited
Chapter 2.14 SSP Simulation – Completing the General System Description and User Types Details 00:06:00
2.14 lab Unlimited
Chapter 2.15 SSP Simulation – Describing the Network Architecture, Envrionment and Inventory Details 00:05:00
2.15 lab Unlimited
chapter 2.16 Chapter 2.16 SSP Simulation – System interconnection, Laws and regulations Details 00:06:00
2.16 lab Unlimited
Chapter 2.17 SSP Simulation – Selecting Controls-RMF STEP 2 Details 00:04:00
2.17 lab Unlimited
Chapter 2.18_SSP Simulation – Implementing the security controls_RMF Step 3 Details 00:04:00
2.18 lab Unlimited
Chapter 2.19_SSP Simulation – Implementing the security controls part 2 Details 00:00:00
2.19 lab Unlimited
Chapter 3
Chapter 3.1_RMF STEP 4 ASSESSING SECURITY CONTROLS PART 1 Details 00:10:00
3.1 Questions Unlimited
Chapter 3.2 The Security Assessment Report – From Objective to Assessment Result Details 00:13:00
3.2 Questions Unlimited
Chapter 3.3 THE SECURITY ASSESSMENT REPORT CONTD Details 00:10:00
3.3 Questions Unlimited
Chapter 3.4 RMF STEP 5 AUTHORIZE THE INFORMATION SYSTEM Details 00:08:00
3.4 Questions Unlimited
Chapter 3.5 RMF STEP 5 CONTD & RMF STEP 6 – MONITOR THE SECURITY CONTROLS Details 00:10:00
3.5 Questions Unlimited
Chapter 3.6 Asessment Simulation – Introductions and preparation for the assessment Details 00:10:00
3.6 lab Unlimited
Chapter 3.7 Sample security assessment kick off Meeting Details 00:10:00
3.7 lab Unlimited
Chapter 3.8_Security Assessment Simulation – Completing the SAR Details 00:10:00
Chapter 3.9 Assessment simulation – completing the SAR part 2 Details 00:10:00
3.9 lab Unlimited
Chapter 3.10 Security Assessment simulation – Introduction to the POA&M Details 00:10:00
3.10lab 16:39:00
Chapter 3.11 Security Assessment simulation – POA&M 1- At-3 Details 00:10:00
3.11 lab Unlimited
Chapter 3.12 Security Assessment simulation – Submit the Authorization Package (RMF Step 5) and receive the ATO Details 00:10:00
Chapter 3.13 Phase 1 Completion – Pep Talk! Details 00:10:00

Course Reviews

5

5
1 ratings
  • 5 stars1
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0
  1. phase 1 & 2

    5

    hello Paul, Thanks for taking time to produce this video and online lab. it has been very useful ane resourceful to me personally. but could you upload another video for chapter 3.8 – completing the SAR because its not opening. thanks

TAKE THIS COURSE
  • $10/MONTH FULL ACCESS PASS
  • UNLIMITED ACCESS
  • Course Badge
  • Course Certificate
32 STUDENTS ENROLLED

Recent Posts

Term : Taxonomy Mismatch: Selected Term does not exist in Taxonomy ! ..more..

About Us

A comprehensive online course unlike any out there in the industry. We teach you information security from the ground up. Our training program takes you from learning theories and concept to real world scenarios that you can visualize and apply. In addition to the on-demand learning, you also have the option to receive one on one mentorship online. Our mentors will help you gain experience by engaging with real-world projects.

top

X