-
FISMA Compliance RMF STEP 1-3
32 Lessons -
-
FISMA Compliance RMF STEPS 4-5
13 Lessons -
In this course, you will learn how to complete the System Security Assessment and Authorization (A&A) process. This process is required in order to make your network FISMA compliant. We will do this by using the NIST Risk management Framework (RMF) for guidance. If you are not familiar with any of the terms i just mentioned, don’t worry, we will break it down in this course.
Think of FISMA compliance as the documentation side of Information Security (aka “Cyber-security Policy”). FISMA compliance is a requirement for all networks that hold federal government data. This course have helped many people get a firm understanding of FISMA Compliance requirement and NIST Special Publications. It has also helped many people secure a career in cyber-security.
Prior to starting this course, I recommend you first complete the COURSE: Fundamentals of IT and Cyber-Security Support The Fundamental course will get you familiar with basic IT terms, help you to learn the interworking of an IT department and understand how cyber-security fits into the big picture of running a business.
In order to learn effectively, please follow these three steps for each video in this course:
Step 1 – Watch the video for understanding (do not take notes)
Step 2 – Watch the video and take notes (on a serious notebook, not a napkin 😉 )
Step 3 – Complete the quiz after the video using only your notes (go back to the video to update your notes as necessary)
By following these steps, you will be able to conceptualize the topics rather than memorize them in your short-term memory. There might be times when you are tempted to skip a step, try and fight the urge.
Fair warning, the quizzes are designed to be thought provoking and is a reflection of how well you grasp the concepts presented in the videos. So you may need to do some Google searches once in a while in order to answer some questions. Don’t get discouraged by this, my goal is to teach you from a true-to-life perspective. In the real world, as a security analyst, you will need to research the web for answers every now and then. Are you ready? let’s get started!
Paul Oyelakin, founder of PJ Courses, is an experienced IT Security Professional with a broad-range of technical and management skills. He has more than 11 years of management and support experience.
Past accomplishments include but is not limited to: Application Development (SDLC), Azure Cloud Secruity, Risk Management/Gap Analysis, Contingency Planning (CP), Disaster Recovery (DR), Incident Response, System Assessment and Authorization (A&A), Security Awareness Training and more.
His educational accomplishments are: Azure Security Engineer Associates (AZ-500), Certified Ethical hacker (CEH) - Master, Cisco Certified Entry network Technician (CCENT), Certified Information System Security Professional (CISSP), Master’s Of Cybersecurity (M.S.), Masters of Business Administration (MBA), Professional Scrum Master I (PSM I), Project Management Professional (PMP) and more.
Cancel Anytime. Learn on your own time with short, well video explainers. Each course incorporate true-to-life learning techniques that teach you how to apply your learning in the real world.
“There are some things you have to experience to understand.”
One-time fee
© 2024 PJ Cyber Security School