• Online, Instructor-Led
Course Description

The "Comprehensive Risk Management Framework Training" is a program aimed at giving students an understanding of risk management principles and frameworks, in the field of information security. This course focuses on implementation, Covers important regulations like IFSMA, FedRAMP (NIST publications) and the Risk Management Framework (RMF) lifecycle
Throughout the course students will explore concepts such as the significance of risk management in information security and an overview of standards and frameworks. The different phases of the RMF lifecycle from preparation to monitoring will be thoroughly examined to ensure an understanding of each step as well as the development of security controls. Additionally the course delves into the General Data Protection Regulation (GDPR), its implications and how ISO 27001 security controls align with NIST 800 53 for coverage.

Students will gain insights into ISO 27001 and ISO 27002 standards for managing information security. The course also covers healthcare related regulations including the Health Insurance Portability and Accountability Act (HIPAA), HITRUST and the Health Information Technology, for Economic and Clinical Health (HITECH) Act. The Course also covers an overview of Payment Card Industry Data Security Standard (PCI DSS) in safeguarding information .

Additionally the training program focuses on managing risks associated with third party vendors. Students will gain knowledge and skills in evaluating and mitigating risks related to third party vendors. They will also learn how to navigate reports, like SSAE 18 SOC 1 and SOC 2 as receive practical guidance on onboarding third party vendors and addressing common challenges. The course will also provide an analysis of SOC 2 Type 2 reports.

The course includes hands on projects and group presentations that allow Students to apply their knowledge in real world scenarios and demonstrate their understanding of risk management concepts. By completing this training program students will be well prepared for roles involving risk management and information security. They will have the expertise to navigate regulatory frameworks effectively evaluate security controls and proficiently manage risks associated with third party vendors

Learning Objectives

This course equips students to acquire knowledge about regulatory authorities like FISMA, FedRAMP, GDPR, and HITRUST. They will understand the objectives, scope, and significant role these regulations play in the IT industry. Emphasis will be placed on the importance of compliance in today's landscape. The course delves into the lifecycle of the Risk Management Framework (RMF) and its practical application: Common risks in IT operations and data handling are also identified. The segment dedicated to "Third Party Vendor Risk and Compliance" focuses on teaching principles for managing risks associated with third-party vendors. Best practices for vendor selection, assessment, and monitoring will be covered, along, with case studies showcasing risk management strategies. In Practical Application of Regulatory Frameworks, students will have an opportunity to apply these frameworks to scenarios. They will gain an understanding of how to implement compliance measures within IT environments while analyzing the consequences that may arise from noncompliance.
Finally, the course incorporates "Practical Exercises and Real Life Applications " where students actively participate in hands-on activities to put their acquired knowledge into practice. These exercises simulate real-world situations allowing for a grasp of frameworks. Additionally, there are group discussions and collaborative problem solving exercises that reinforce learning and ensure participants are well prepared to apply these principles in real life situations.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Risk Management
  • Test and Evaluation
  • Targets
  • Strategic Planning and Policy

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@hq.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.