Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. IT Dojo, Inc.
  4. Information Security Continuous Monitoring

Information Security Continuous Monitoring

Information Security Continuous Monitoring (three days) covers roles and responsibilities, establishment and implementation of the ISCM strategy, analysis and reporting of findings, and program review in accordance with NIST Special Publication (SP) 800-137. Practical guidance on ISCM automation and support tools is provided. Student exercises, collaboration and case studies are used to reinforce the concepts taught in the class. The course content of Information Security Continuous Monitoring is geared to meet the needs of a diverse audience covering the spectrum of management, operational and technical roles. Students will gain thorough knowledge of the theory and policy background underlying continuous monitoring as well as the practical knowledge needed for effective implementation.

Provider Information

More courses from this provider:
Contact Information

IT Dojo
4176 S Plaza Trail
Suite 207
Virginia Beach, VA 23452

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Catalog Number
RMFCM
Course Prerequisites

The Continuous Monitoring training program is appropriate for government employees and contractors in DoD, federal? civil? agencies and the intelligence community, particularly those responsible for managing and monitoring security posture on an ongoing basis.

Training Purpose
Skill Development
Specific Audience
Academia
Contractor
Federal Employee
Delivery Method
Classroom
Online, Instructor-Led
Course Location

4176 S Plaza Trail
Suite 207
Virginia Beach, VA 23452

Course Location Map
  • Your Location
  • Providers
  • Courses
  • Course and Provider Quantity
  • Classroom
  • Online, Instructor-Led

Learning Objectives

Organization-wide view of ISCM Ongoing System Authorizations Role of Automation ISCM Roles and Responsibilities I SCM Process? NIST SP 800-137Step 1? Define Strategy Step 2? Establish ISCM program Step 3? Implement Step 4? Analyze and Report Step 5? Respond to Findings Step 6? Review and Update Supporting Technologies Security Automation Domains Security Information and Event Management (SIEM)Security Content Automation Protocol (SCAP)Reference Data Sources National Vulnerability Database Security Configuration Checklists ISCM Reference Model Exercises and Case Studies

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: