Zenler Player
Your course is loading. Hang tight.
FISMA Compliance - Learn the NIST-RMF
Back to curriculum
0% Complete
0% Complete
Course Preparation
Introduction to FISMA Compliance
Introduction to NIST 800-37
RMF Step 0 - Task P1 - P3
RMF Step 0 - Mapping Guide
RMF step 1: Security Categorization Part 1
RMF step 1: Security Categorization Part 2
RMF Step 1: Security Categorization Part 3
RMF STEP 0 – Prioritizing systems with the same impact level (Task P6 - Optional)
RMF Step 0 – System Level Tasks (P8 – P13)
RMF Step 0 – System Level Tasks (P14-15)
RMF Step 0 – System Level Tasks (P16-P18)
RMF step 2 : Select Security Controls
RMF Step 2: Control Tailoring
RMF Step 3 - Implement Security Controls
RMF Step 3 - Implementation Statement Practice 2
RMF Step 3 - Implementation Statement Practice 3
RMF Step 3 - Implementation Statement Exercise
Pep Talk and Intro to simulations
Simulation: Editing the Cover Page and Revision History
Simulations: Security Categorization
Digital Identity Part 1
Digital Identity Part 2
Digital Identity Part 3
Simulation: Digital Identity
SSP Simulation - Ports and Crypto Module
SSP Simulation - Separation of Duties
SSP Simulation - Implementation Statement Practice
Simulation: SSP Submission and Approval
RMF Step 4: Assessing Security Controls
Security Assessment Report (SAR) Part 1
Security Assessment Report Part 2
RMF Step 5: Authorize the Information System
RMF Step 5 & 6 – System Authorization and Continuous Monitoring
Simulation – Introductions and Preparation for the Assessment
Security Assessment Kick-Off Meeting Demo
Simulation: Completing the SAR
Simulation – completing the SAR part 2
Simulation: POA&M Reports Review Part 1
Simulation: POA&M Reports Review Part 2
Simulation: Authorize System and Receive ATO
ATO Completion - Pep Talk!
FISMA Compliance RMF STEP 1-3
Course Preparation
Preview
Introduction to FISMA Compliance
Introduction to NIST 800-37
RMF Step 0 - Task P1 - P3
Preview
RMF Step 0 - Mapping Guide
Preview
RMF step 1: Security Categorization Part 1
RMF step 1: Security Categorization Part 2
RMF Step 1: Security Categorization Part 3
RMF STEP 0 – Prioritizing systems with the same impact level (Task P6 - Optional)
RMF Step 0 – System Level Tasks (P8 – P13)
RMF Step 0 – System Level Tasks (P14-15)
RMF Step 0 – System Level Tasks (P16-P18)
RMF step 2 : Select Security Controls
RMF Step 2: Control Tailoring
RMF Step 3 - Implement Security Controls
Preview
RMF Step 3 - Implementation Statement Practice 2
RMF Step 3 - Implementation Statement Practice 3
RMF Step 3 - Implementation Statement Exercise
Pep Talk and Intro to simulations
Simulation: Editing the Cover Page and Revision History
Simulations: Security Categorization
Digital Identity Part 1
Digital Identity Part 2
Digital Identity Part 3
Simulation: Digital Identity
SSP Simulation - Ports and Crypto Module
SSP Simulation - Separation of Duties
SSP Simulation - Implementation Statement Practice
Simulation: SSP Submission and Approval
Preview
FISMA Compliance RMF STEPS 4-5
RMF Step 4: Assessing Security Controls
Security Assessment Report (SAR) Part 1
Security Assessment Report Part 2
RMF Step 5: Authorize the Information System
RMF Step 5 & 6 – System Authorization and Continuous Monitoring
Simulation – Introductions and Preparation for the Assessment
Security Assessment Kick-Off Meeting Demo
Simulation: Completing the SAR
Simulation – completing the SAR part 2
Simulation: POA&M Reports Review Part 1
Simulation: POA&M Reports Review Part 2
Simulation: Authorize System and Receive ATO
ATO Completion - Pep Talk!
×
This is an unpublished lesson. This lesson will not be shown for students unless you set it as Public.
Back to Dashboard
No contents are available in this lesson!
No lessons available !
Back to Dashboard
Lesson contents locked
Enroll to unlock this lesson.
Enroll to unlock
Next Lesson