Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. National Institute for Cybersecurity Certifications
  4. Cybersecurity Compliance Methodologies I

Cybersecurity Compliance Methodologies I

Students are provided the with essential skills in areas such as understanding the cybersecurity landscape, managing cybersecurity risks, responding to incidents, practicing secure software development, complying with legal and regulatory standards, ensuring physical and operational security, and designing secure network infrastructure in preparation for the ISC2 Certified in Cyber Certification. Students will also review and analyze the concepts and interrelationships underlying cybersecurity compliance methodologies, including the NIST Risk Management Framework (RMF), FedRAMP, NIST 800-171, CMMC, NIST Cyber Security Framework (CSF), and NIST 800-53. Students develop competencies to utilize NIST RMF Step 0 (Prepare) and are introduced to Step 1 (Categorize), as well as FedRAMP Steps 1-2.

Course Overview

Overall Proficiency Level
2 - Intermediate
Training Purpose
Management Development
Skill Development
Specific Audience
All
Delivery Method
Online, Instructor-Led
  • Online, Instructor-Led

Learning Objectives

Analyze and interpret patterns of threats, attacks, vulnerabilities, and devise effective countermeasures. Evaluate cybersecurity risks, formulate assessments, and manage them by designing tailored mitigation strategies. Apply knowledge in creating and implementing response strategies for cybersecurity incidents, and devise comprehensive disaster recovery and business continuity plans. Synthesize secure coding practices and integrate them innovatively throughout the software development lifecycle. Critically review and apply cybersecurity laws, regulations, and advocate for privacy and data protection in all cybersecurity activities. Formulate and maintain strategies for the security of physical assets and operational security procedures, considering potential threats and changes in the environment. Define and analyze risk tolerance as it applies to an organization's decision-making process. Analyze CGRC Domain learning contributions to certification preparation.
Apply the NIST RMF to a practical scenario for addressing FISMA compliance. Analyze systems for categorization and align with policy and guidance. Develop a System Security Plan appropriate for a system. Identify the requirements of Personally Identifiable Information (PII) and apply appropriate controls.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Competency Areas

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov(link sends email). Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date:

You have been selected to participate in a brief survey about your experience today with National Initiative for Cybersecurity Careers and Studies.

Would you like to participate in our survey?

If you accept you will be leaving the National Initiative for Cybersecurity Careers and Studies website and going to a third party site.
That site may have different privacy, security and accessibility policies than the National Initiative for Cybersecurity Careers and Studies site.
National Initiative for Cybersecurity Careers and Studies does not endorse any commercial products, services, programs or content on the third party website.
Thank you for visiting our site. We hope your visit was informative and enjoyable.