About the Course
In this course you will review and analyze the compliance implications of selected cloud security policies and methods with a specific focus on the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF), the NIST Cyber Security Framework (CSF), the Cybersecurity Maturity Model Certification (CMMC), and FedRAMP. Integrating enterprise and cloud system risk management, you will apply the frameworks as they complete project deliverables and communicate project results. In addition, you will develop in-depth analytic competencies by applying the Common Body of Knowledge (CBK) of the Certified Authorization Professional (CAP) to relevant risk management problems.
What You Will Learn
- Understand the RMF and risk management and assessment for information technology systems
- Apply cost-effective security controls based on risk and best practices on assessment and analysis
- Understand the RMF/CSF/FISMA/NIST processes for authorizing federal IT systems and authorization processes
- Explain RMF step by step procedures
- Understand different key roles and their responsibilities
- Recognize recent publications of NIST and FISMA regarding RMF and select, implement, and assess security controls
- Apply the RMF/CSF/FedRAMP/CMMC procedures to real world application, and ways to monitor security controls
- Tackle the problems of RMF in each phase of procedures
Skills You Will Gain
Compliance
Ability to determine the compliance implications of federal cybersecurity policies for the various categories of clients served.
Business Communication
Strong business communication skills for job-readiness.
Risk Tolerance Analysis
Ability to analyze risk tolerance as it applies to an organization's decision-making process.
ERM Approaches
Analyze the various framework approaches to Enterprise Risk Management (ERM).
System Security Planning
Understand how to develop a System Security Plan appropriate for a system.
PII Controls
Identify the requirements of Personally Identifiable Information (PII) and apply appropriate controls.