Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Cybrary

Executive RMF

via Cybrary

Overview

While managing risk, the RMF framework can also help an organization to select appropriate security controls, to balance security and functionality for a safe and seamless end-user experience. The framework is made up of six steps, system categorization, selection of controls, implementation, assessment, authorization, and monitoring those controls. But the key to each of these steps is the preparation put into each component, which determines the success of the framework. One of the main problems which can occur when trying to implement a security program, are the issues between the Information Technology (IT) and Security teams. Each team has different objectives but must meet in the middle to accommodate user needs, as well as the needs of the business.

RMF does not have to just be for federal organizations, it can be integrated into any information security program, to ensure effective and efficient security practices. Each step will be described in detail, including mention of supplemental documentation, who will be involved at each stage, and how to integrate eachcomponent into a security program. The RMF steps are meant to help streamline the Authorization to Operation, or ATO, process. When implemented correctly, security processes will be aligned to meet functionality and security with the IT and Security teams.

The Art of Exploitation is one of the most sophisticated attacks in Ethical Hacking. In this course, students will learn from scratch how to find a vulnerability or weakness in any system. Check for the right exploit to hack the system using this vulnerability, instead of using some kiddie script or waiting for a victim mistake clinking on a malicious link or attachment. Students will also learn how to write their one exploit using python script and use it to hack system affected with Buffer Overflow.

What is Risk Management? It is defined as the forecasting and evaluation of risks together with the identification of procedures to avoid or minimize their impact. What will I learn? Risk Management best practices, How and why it's essential to identify mission critical systems, and the loss impact of critical systems should failure occur.

The National Institute of Standards and Technology (NIST) established the Risk Management Framework (RMF) as a set of operational and procedural standards or guidelines that a US government agency must follow to ensure the compliance of its data systems.

RMF originally was designed to benefit Department of Defense (DoD) military, civilian, and contractor personnel who are responsible for evaluating information systems under the RMF and certifying to the Government that information systems meet security requirements. Because managing risk is a critical concept for organizations that house sensitive data, entities outside of the public sector have taken notice of the effectiveness of RMF practices.

Prerequisites

Individuals who wish to take this course should be team leads in the IT or Security sectors, senior management, or executive management looking to implement, or improve, RMF use in their organizations. Users should already have a basic understanding of the NIST Risk Management Framework before taking this course. Users should also be familiar with the accompanying NIST Special Publication guides, as outlined in the supplemental material section.

Syllabus

  • Module 1: NIST RMF: The Basics
    • 1.0 Introduction
    • 1.1 RMF Overview
    • 1.2 Creating a Top-Down RMF Approach
    • 1.3 New Step - Preparation
  • Module 2: Categorize, Select and Implement
    • 2.0 Categorize the System (Including HVA's)
    • 2.1 Selecting Controls
    • 2.2 Implementing Proper Controls
  • Module 3: Assess, Authorize and Monitor
    • 3.0 Assessing the System
    • 3.1 Lets Get that ATO!
    • 3.2 Monitoring System, Controls and Changes

Taught by

Nikki Robinson

Reviews

Start your review of Executive RMF

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.