Course Desc: An in-depth exploration and application of the skills needed to implement the NIST Risk Management Framework (RMF) in an organization. The major steps of the RMF-- prepare, categorize, select, implement, assess, authorize, and monitor 'are studied and applied. Hands-on, project-based case studies are used to simulate scenarios for each RMF step. Discussion covers how to conduct a mock risk assessment of a fictitious organization and create a Plan of Action and Milestones (POAM) for the organization. Students may receive credit for only one of the following courses: CMAP 625 or CMP 630.
Learning Objectives
Learners will master the following Cybersecurity Skills upon completion of the course.
Explain different cybersecurity mechanisms to help ensure the protection of information technology assets and networks.
Prepare students with the cybersecurity principles, technical knowledge, and skills needed to protect data, computer systems, and networks.
Explain different cybersecurity mechanisms to help ensure the protection of information technology assets and networks.
Describe and apply appropriate ethical, security implications, and moral standards to modern computing environments and understand cybersecurity terminology
Analyze and evaluate systems with respect to maintaining operations in the presence of risks and threats.
Identify and use appropriate resources to stay abreast of the latest industry development tools, cryptographic systems elements, cyberspace activities, and techniques to reduce the cybersecurity risk by exhibit best practices or research findings.
Determine appropriate data models to design database applications to enforce information integrity, security, and confidentiality by using SQL and Design principles.
Describe the fundamental problem-solving techniques and overview of a scripting language to automate the administrative task and create an appropriate solution within the context of cybersecurity.
Compare and contrast information security /assurance to deals with social, political, legal, and ethical issues within the organization and protect organization data.
Evaluate network security solutions/Internet crimes/ or cloud computing methodology to prevent and detect intrusions.
Discuss and evaluate network security solutions, Internet crimes, and cloud computing methodology to ensure security for their employees, customers, and asset.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.