Risk Management Framework for DoD & Intelligence Communities Information Technology Training

Risk Management Framework for DoD & Intelligence Communities Information Technology Training

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

Risk Management Framework for DoD & Intelligence Communities Information Technology Training In-depth

Risk Management Framework for DoD & Intelligence Communities Information Technology Training course equips the student with an overview of the system authorization process (also known as C&A) and the Risk Management Framework (RMF) for National Security Systems (NSS). In addition to the classroom instruction, the student will also participate in several scenario-based hands-on exercises in the implementation of the RMF to provide a clear knowledge bridge to the revised system authorization processes for those currently working with C&A for National Security Systems or for those who have limited or no C&A experience. These exercises will include the development of Systems Security Plans (SSPs), Security Assessment Reports (SARs), and Plans of Action and Milestones (POA&Ms) for a NSS.

This Risk Management Framework for DoD & Intelligence Communities Information Technology Training course meets the requirements of National Security Directive 42 (NSD-42), which outlines the roles and responsibilities for securing NSSs. The CNSS In-Depth Course will address the Federal and Intelligence Community requirements, including NIST SP 800-37, NIST SP 800-39, CNSS 1199 and CNSS 1253.

Certification

You will receive your National Security Agency (NSA) and Committee on National Security Systems (CNSS) NSTISSI 4011, Information System Security Professional Certificate. As well as earning CPE’s to your existing certifications with CompTIA, ISC2, ISACA and IAPP.

Course Outline

Module 1: Critical Definitions and Policies
Module 2: C&A Transformation/Transition Overview
Module 3: The IC and the Transformation
Module 4: Roles & Responsibilities
Module 5: Accreditation Boundary
Module 6: System Categorization
Module 7: Select Security Controls
Module 8: Implement, Document & Assess Security Controls
Module 9: Authorize Information System
Module 10: Monitor Information System
Module 11: Reciprocity

Whether you are looking for general information or have a specific question, we want to help

Request More Information

Time Frame: 0-3 Months4-12 Months

Location

If multiple locations, please list in the additional comments field.

On-site
Virtual


Public Training Schedule
Private Group Training

Print Friendly, PDF & Email