Zenler Player
Your course is loading. Hang tight.
FISMA Compliance - Learn the NIST-RMF
Back to curriculum
0% Complete
0% Complete
Course intro
Intro to FISMA Compliance
Introduction to NIST 800-37
RMF Step 0
Untitled lesson
RMF step 1: Security Categorization Part 1
RMF step 1: Security Categorization Part 2
Security Categorization Part 3
RMF STEP 0 – Prioritizing systems with the same impact level (Task p6 - Optional)
RMF Step 0: System Level Tasks (P8 - P13)
System and Technical Description Part 1
System and Technical Description Part 2
RMF step 2 : Select Security Controls
RMF Step 2: Control Tailoring
RMF Step 3 - Implement Security Controls
Implementation Statement Practice 2
Implementation Statement Practice 3
Implementation Statement Exercise
Pep Talk and Intro to simulations
Simulation: Editing the Cover Page
Simulations: Security Categorization
Digital Identity Part 1
Digital Identity Part 2
Digital Identity Part 3
Simulation: Digital Identity
Simulation: POC
Simulation: General System Description and User Types
Simulation: Network Architecture, Environment and Inventory
Simulation: System interconnection, Laws and regulations
Simulation: RMF step 2 - Selecting Controls
Simulation: RMF Step 3 - Implementing Security Controls Part 1
Simulation: Implementing Security Controls Part 2
RMF Step 4: Assessing Security Controls
Security Assessment Report (SAR) Part 1
Security Assessment Report Part 2
RMF Step 5: Authorize the Information System
RMF Step 5 & 6 – System Authorization and Continuous Monitoring
Simulation – Introductions and Preparation for the Assessment
Security Assessment Kick-Off Meeting Demo
Simulation: Completing the SAR
Simulation – completing the SAR part 2
Simulation: POA&M Reports Review Part 1
Simulation: POA&M Reports Review Part 2
Simulation: Authorize System and Receive ATO
ATO Completion - Pep Talk!
FISMA Compliance RMF STEP 1-3
Course intro
Preview
Intro to FISMA Compliance
Introduction to NIST 800-37
RMF Step 0
Preview
Untitled lesson
RMF step 1: Security Categorization Part 1
RMF step 1: Security Categorization Part 2
Security Categorization Part 3
RMF STEP 0 – Prioritizing systems with the same impact level (Task p6 - Optional)
RMF Step 0: System Level Tasks (P8 - P13)
System and Technical Description Part 1
System and Technical Description Part 2
RMF step 2 : Select Security Controls
RMF Step 2: Control Tailoring
RMF Step 3 - Implement Security Controls
Preview
Implementation Statement Practice 2
Implementation Statement Practice 3
Implementation Statement Exercise
Pep Talk and Intro to simulations
Simulation: Editing the Cover Page
Simulations: Security Categorization
Digital Identity Part 1
Digital Identity Part 2
Digital Identity Part 3
Simulation: Digital Identity
Simulation: POC
Simulation: General System Description and User Types
Simulation: Network Architecture, Environment and Inventory
Simulation: System interconnection, Laws and regulations
Simulation: RMF step 2 - Selecting Controls
Preview
Simulation: RMF Step 3 - Implementing Security Controls Part 1
Simulation: Implementing Security Controls Part 2
FISMA Compliance RMF STEPS 4-5
RMF Step 4: Assessing Security Controls
Security Assessment Report (SAR) Part 1
Security Assessment Report Part 2
RMF Step 5: Authorize the Information System
RMF Step 5 & 6 – System Authorization and Continuous Monitoring
Simulation – Introductions and Preparation for the Assessment
Security Assessment Kick-Off Meeting Demo
Simulation: Completing the SAR
Simulation – completing the SAR part 2
Simulation: POA&M Reports Review Part 1
Simulation: POA&M Reports Review Part 2
Simulation: Authorize System and Receive ATO
ATO Completion - Pep Talk!
×
This is an unpublished lesson. This lesson will not be shown for students unless you set it as Public.
Back to Dashboard
No contents are available in this lesson!
No lessons available !
Back to Dashboard
Lesson contents locked
Enroll to unlock this lesson.
Enroll to unlock
Next Lesson