Risk Management Framework (RMF) (SEC-RMF)
Virtual ClassroomLearning Style
4 DaysCourse Duration
About Individual Course:
About this course:
The Department of Defense Risk Management Framework (RMF) program is offered on a regularly-scheduled basis at our training sites in Fremont, CA (San Francisco Bay Area). Each session is also available to distance learners via Live Online (Instructor-led). We are also able to bring this training on-site to your facility.
Risk Management Framework (RMF) is the unified information security framework for the entire federal government that is replacing the legacy Certification and Accreditation (C&A) processes within federal government departments and agencies, the Department of Defense (DOD) and the Intelligence Community (IC).
Risk Management Framework (RMF) is an integral part of the implementation of FISMA, the Federal Information Security Management Act, and is based on publications of the National Institute of Standards and Technology (NIST) and the Committee on National Security Systems (CNSS).
Risk Management Framework (RMF) training is suitable for DoD employees and contractors. This training program emphasizes the transition now taking place at DoD from DIACAP to RMF.
Virtual Instructed-Led Outline
- Define the important concepts: assurance, assessment, authorization
- List the three key characteristics of security
- List the reasons for the widespread change to the Risk Management Framework (RMF)
- Define security controls and list examples of the three classes of controls
- Describe the evolution and interaction of security laws, policy, and regulations in information security
- List the DoD IA policy drivers
- Access the correct documents for information assurance guidance
- Describe Assessment and Authorization transformation goals
- Understand and assign the correct roles in the RMF process for your organization
- Perform the responsibilities associated with your RMF role
- Identify the RMF roles of your colleagues
- Support and follow the four-step risk management process within your agency
- Understand the factors that produce the impact level (high, medium, low) of your information system
- Accurately quantify the level of risk to your information system
- Decide on the effective risk management options for your system
- Identify the six steps in the RMF process
- Produce or support the production of the key documents in the RMF process
- Categorize the security characteristics of confidentiality, integrity and availability for an information system as high, medium, or low
- Describe the information processed, stored and transmitted by your information system
- Register an information system
- Identify your information system's common controls
- Select the appropriate baseline controls for your information system
- Tailor security controls for your information system
- Supplement the baseline and tailored controls for your information system
- Develop and/or support a continuous monitoring strategy for your information system
- Allocate the appropriate security controls for your information system
- Implement the security controls for your information system
- Describe your information system in a functional manner appropriate for documentation in the security plan
- Use one or more of the three methods of assessment to assess your information system's security controls
- Prepare or support the preparation of the security assessment report documenting the issues, findings, and recommendations from the security control assessment
- Support the creation and completion of the plan of action and milestones (POAM) in accordance with your RMF role
- Describe the contents of the security authorization package
- Authorize or support the authorization of the information system
- State the level of acceptable risk for your information system
- Adhere to the correct procedures when a system is authorized to operate, given interim authorization, or not authorized to operate
- Manage, control and document changes to your information system and its environment of operation
- Implement the correct forms of patches when the situation calls for a patch
- Select or support the selection of the appropriate assessments
- State the characteristics of good performance measures and choose accordingly
- Report or react to the reporting of vulnerabilities and mitigation
- Decommission an information system in the most efficient of the four methods based on the type of information captured, process or stored by the information system
- Utilize information assurance tools such as eMass to improve the A&A process
- Access the DIACAP Knowledge Service for up-to-date information on the risk management framework
- Understand the purpose and use of CyberScope
|Learning Style||Virtual Classroom|
|Course Duration||4 Days|
|VPA Eligible||VPA Eligible|
Frequently Asked Questions About Virtual Instructor-Led Courses
I can't connect to my class, what are my options?
The link to the class is available upon logging in to your dashboard. If you are unable to see it, please contact our support team at 1-855-800-8240 and they will be happy to provide you the direct link via email or the dial in number.
I can't make it to attend to class. Can I reschedule?
Yes, you can reschedule your class. Please contact your Sales representative and they will arrange this for you. If you forgot his/her name, feel free to contact our support team at email@example.com or 1-855-800-8240.
Will I get my certificate upon completion?
Yes. Upon completion of the course, it will be available on your course as a Trophy Icon for you to download. If you do not see this, you will need to contact firstname.lastname@example.org with the following details so they can email you the certificate: Class Name, Class Date, Account Rep, and Your Email.
I cannot connect to my lab. Help!
Your Lab is accessible on the bottom part of your course. You will see a button that says "LAB". Just click it to launch the lab. Please note that some classes don’t need/require a LAB. You can verify with our support team by calling them at 1-855-800-8240 or by email at email@example.com. You can also check with your Instructor or the Associate Instructor if your class includes one.
What is my access code for Skillpipe?
A. Not all of the classes have or require Skillpipe. If your class includes one, please check your email as you should have received one from firstname.lastname@example.org. In case you do not find it in your inbox, please check the Spam / Junk folder. For any further assistance, you can call the support at 1-855-800-8240 or contact them via email at email@example.com.
I don't have audio. I can't hear the instructor.
Make sure you are using a compatible headset for your laptop or computer. If you don’t have a headset, you can use the built-in speaker of your laptop. Otherwise, you can use the dial in option by calling the dial in number provided in the class joining email. You may also contact support team for the dial in numbers associated for your training at 1-855-800-8240 or contact them via email at firstname.lastname@example.org.
How can I reach student support?
Support can be reach via phone at 1855-800-8240; via email at email@example.com or via chat support through the chat button on our website. Please note that support office hours will be from 8am-5pm CST Monday to Friday. Any concerns after office hours will be attended the following business day.
Have Questions? Ask Us.
Turn Training Into A Personalized Learning Experience
- Problem Solving through ExpertConnect & Peer-To-Peer Learning
- Find The Quickest Path To Learn With Career Paths
- Access All Courses With Master Subscription
- Manage Your Team With Learning Analytics
- Virtual Classroom Training & Self-Paced Learning
- Integrate With Your LMS Through API's