Risk Management Framework for DoD & Intelligence Communities Information Technology Training In-depth

Risk Management Framework for DoD & Intelligence Communities Information Technology Training In-depth

Introduction:

Risk Management Framework for DoD & Intelligence Communities Information Technology Training In-depth

Risk Management Framework for DoD & Intelligence Communities Information Technology Training course equips the student with an overview of the system authorization process (also known as C&A) and the Risk Management Framework (RMF) for National Security Systems (NSS). In addition to the classroom instruction, the student will also participate in several scenario-based hands-on exercises in the implementation of the RMF to provide a clear knowledge bridge to the revised system authorization processes for those currently working with C&A for National Security Systems or for those who have limited or no C&A experience. These exercises will include the development of Systems Security Plans (SSPs), Security Assessment Reports (SARs), and Plans of Action and Milestones (POA&Ms) for a NSS.

This Risk Management Framework for DoD & Intelligence Communities Information Technology Training course meets the requirements of National Security Directive 42 (NSD-42), which outlines the roles and responsibilities for securing NSSs. The CNSS In-Depth Course will address the Federal and Intelligence Community requirements, including NIST SP 800-37, NIST SP 800-39, CNSS 1199 and CNSS 1253.

Risk Management Framework for DoD & Intelligence Communities Information Technology Training In-depthRelated Courses:

Duration:4 days

Certification

You will receive your National Security Agency (NSA) and Committee on National Security Systems (CNSS) NSTISSI 4011, Information System Security Professional Certificate. As well as earning CPE’s to your existing certifications with CompTIA, ISC2, ISACA and IAPP.

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Course Content:

Module 1: Critical Definitions and Policies
Module 2: C&A Transformation/Transition Overview
Module 3: The IC and the Transformation
Module 4: Roles & Responsibilities
Module 5: Accreditation Boundary
Module 6: System Categorization
Module 7: Select Security Controls
Module 8: Implement, Document & Assess Security Controls
Module 9: Authorize Information System
Module 10: Monitor Information System
Module 11: Reciprocity

Whether you are looking for general information or have a specific question, we want to help

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment