Course 3 Module 1 - Risk Management Framework (RMF)
- Description
- Curriculum
- Reviews
-
3Organizations, Businesses and Government AgenciesText lessonThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
4Laws and RegulationsText lessonSorry, this lesson is currently locked. You need to complete "Organizations, Businesses and Government Agencies" before accessing it.
-
57 Steps of Risk Management Framework (RMF)Text lessonSorry, this lesson is currently locked. You need to complete "Organizations, Businesses and Government Agencies" before accessing it.
-
6Course 3 - Module 1 AssignmentAssignmentSorry, this lesson is currently locked. You need to complete "Organizations, Businesses and Government Agencies" before accessing it.
-
7CategorizeText lessonThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
By the end of this module, you’ll know how to:
- describe and document the system for management and tracking;
- categorize the system, including the information processed by the system, represented by the organization’s identified information types, and understand the purpose of the system, and the data sensitivity;
- security categorization results will be reviewed and approved by senior leaders in the organization.
-
8Types of SystemsText lessonThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
9FISMAText lessonThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
10Potential Impact on Organizations and IndividualsText lessonThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
11How Security Categorization Applies to Information (DATA)Text lessonThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
12Security Categorization Applies to Information Systems (COMPUTERS)Text lessonThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
13Knowledge Check5 questionsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
14Categorization Homework – Use FIPS 199 & NIST SP 800-60 Vol2 R1AssignmentThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
15Adams Supplies TemplateAssignmentThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
16Assignment 2AssignmentThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
18Introduction to Policies and GuidelinesText lessonThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Welcome to the Risk Management Framework, or RMF, Implement Step. This course focuses on the Implement Step, and by the end of the course, you will be able to define the Implement Step in the RMF.
The purpose of the Implement Step is to implement the controls in the Security and Privacy Plans for the system and the organization and to document in a baseline configuration, the specific details of the Control Implementation.
Objectives
Before you begin, consider the following course learning objectives.
• Identify Policies and guidelines for the Implement Step in the RMF
• Identify the two tasks and associated inputs, outputs, roles, and responsibilities in the Implement Step.
Lessons:
The course is divided into two lessons:
Lesson 1: Policies and Guidelines
Lesson 2: Tasks, Potential Inputs & Expected Outputs, Roles and Responsibilities
-
19Tasks, Inputs and Outputs, Roles and ResponsibilitiesText lessonThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
20Things to remember.3 questionsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
21Implementing Security ControlsText lessonThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
22Configuration ManagementText lessonThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.

-
23Information System Contingency PlanText lessonThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.

-
24IT Incident Response Process OverviewText lessonThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.

-
25Protecting The Confidentiality of Personally Identifiable InformationText lessonThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.

-
26What is FISMA Compliance?Text lessonThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
27Risk Management Framework – Step 5: Assessing Security ControlsText lessonThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Risk Management Framework
Welcome to Risk Management Framework –RMF Step 5: Assessing Security Controls. Once the security controls are implemented, they must be assessed, the results documented in the Security Assessment Report, and remediation efforts completed.
Objectives
By the end of this lesson, you should be able to:
- Select an Assessor
- Develop and approve a security assessment plan,
- Assess security controls based on the plan,
- Document security assessment results,
- Conduct remediation activities.
- ï‚· Start with the development of a Plan Of Action and Milestones
Sources
The authoritative sources listed here are to be used for Security Control Assessment Guidance:
- NIST Special Publication 800-53A Revision 5, Assessing Security and Privacy Controls in Information Systems and Organizations
- NIST Special Publication 800-37 R2 is the Guide for Applying RMF to Federal Information Systems
Purpose
The purpose of the Assess step is to determine if the controls selected for implementation are implemented correctly, operating as intended, and producing the desired outcome concerning meeting the security and privacy requirements for the system and the organization.
-
28Questions to considerAssignmentThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
Cyber Security Standards
-
Introduction to Computer Networking
-
What is Prerequisite coursesA prerequisite is a specific course that you must complete before you can take another course at the next grade level.
Working hours
| Monday | 9:00 am - 5:00 pm |
| Tuesday | 9:00 am - 5:00 pm |
| Wednesday | 9:00 am - 5:00 pm |
| Thursday | 9:00 am - 5:00 pm |
| Friday | 9:00 am - 5:00 pm |
| Saturday | Closed |
| Sunday | Closed |