Practical Nist Risk Management Framework Implementation

Posted By: ELK1nG

Practical Nist Risk Management Framework Implementation
Published 11/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.77 GB | Duration: 7h 43m

With Use Case and Assignments

What you'll learn

Master all 47 NIST RMF tasks through hands-on application.

Apply RMF processes to different organizational scenarios.

Analyze and improve cybersecurity risk management in real contexts.

Develop actionable security and privacy strategies for live systems.

Requirements

No prerequisites

Description

The course  "Practical NIST Risk Management Framework Implementation” is an in-depth exploration tailored for those who aspire to deeply understand and apply the principles of cybersecurity risk management in the workplace. It unpacks the NIST RMF through a methodical study of its 47 tasks, coupled with actionable insights and applications.Participants will begin with a detailed review of the RMF tasks using a model company scenario, which serves as a concrete example for discussion and analysis. This case study method provides a clear context for each task, emphasizing the application over mere theory.The course is structured to reinforce learning through practice. After studying the model company, learners will take on assignments that apply the RMF tasks to different organizational settings. This dual-application approach ensures that the knowledge gained is adaptable and practical, preparing learners to implement these skills in their own or various professional environments.Professionals who will find the course most beneficial include IT staff, cybersecurity professionals, system administrators, and compliance officers who are looking to expand their knowledge base or seeking to apply the RMF in their daily work. The course is suitable for those aiming to enhance their careers in cybersecurity, refine their organization's risk management practices, or develop a proactive approach to emerging security challenges.By the end of this course, learners will not just have a certificate to show for their efforts but will have acquired a skill set that can be directly applied to improve cybersecurity measures within their organizations. This course promises a transformation from a theoretical understanding of the RMF to practical, real-world application, making it a critical investment for anyone serious about cybersecurity risk management.

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 Why This Course?

Lecture 3 About NIST Risk Management Framework

Lecture 4 NIST 800-53 Structure

Lecture 5 The Model Company - CyberSec Solutions

Section 2: The Fundamentals

Lecture 6 The Fundamentals

Lecture 7 Organization Wide Risk Management

Lecture 8 Information Security and Privacy in the RMF

Lecture 9 NIST RMF Steps

Lecture 10 System and System Elements

Lecture 11 Authorization Boundaries

Lecture 12 Requirements and Controls

Lecture 13 Security and Privacy Posture

Lecture 14 Supply Chain Risk Management

Section 3: 1. Prepare

Lecture 15 PREPARE TASKS - ORGANIZATION and SYSTEM LEVEL

Lecture 16 Task P-1 - RISK MANAGEMENT ROLES

Lecture 17 Task P-1: CyberSec Risk Management Roles

Lecture 18 Task P-2 - RISK MANAGEMENT STRATEGY

Lecture 19 Task P-2: CyberSec Risk Management Strategy

Lecture 20 Task P-3: RISK ASSESSMENT - ORGANIZATION

Lecture 21 Task P-3 CyberSec Risk Assessment

Lecture 22 Task P-4: ORGANIZATIONALLY-TAILORED CONTROL BASELINES

Lecture 23 Task P-4 CyberSec Control Baselines

Lecture 24 Task P-5: COMMON CONTROL IDENTIFICATION

Lecture 25 Task P-5 CyberSec Common Control Identification

Lecture 26 Task P-6: IMPACT-LEVEL PRIORITIZATION

Lecture 27 Task P-6 CyberSec Impact Level Prioritization

Lecture 28 Task P-7: CONTINUOUS MONITORING STRATEGY—ORGANIZATION

Lecture 29 Task P-7 CyberSec Continuous Monitoring Strategy

Lecture 30 Task P-8: MISSION OR BUSINESS FOCUS

Lecture 31 Task P-8: CyberSec Mission or Business Focus

Lecture 32 Task P-9: SYSTEM STAKEHOLDERS

Lecture 33 Task P-9: CyberSec System Stakeholders

Lecture 34 Task P-10: ASSET IDENTIFICATION

Lecture 35 Task P-9: CyberSec Asset Identification

Lecture 36 Task P-10: ASSET IDENTIFICATION

Lecture 37 Task P-10: CyberSec Asset Identification

Lecture 38 Task P-11: AUTHORIZATION BOUNDARY

Lecture 39 Task P-11: CyberSec Authorization Boundary

Lecture 40 Task P-12: INFORMATION TYPES

Lecture 41 Task P-12: CyberSec Information Types

Lecture 42 Task P-13: INFORMATION LIFE CYCLE

Lecture 43 Task P-13: CyberSec Information Life Cycle

Lecture 44 Task P-14: RISK ASSESSMENT—SYSTEM

Lecture 45 Task P-14: CyberSec System Risk Assessment

Lecture 46 Task P-15 - REQUIREMENTS DEFINITION

Lecture 47 Task P-15: CyberSec Requirement Definition

Lecture 48 Task P-16 - ENTERPRISE ARCHITECTURE

Lecture 49 Task P-16: CyberSec Enterprise Architecture

Lecture 50 Task P-17: REQUIREMENTS ALLOCATION

Lecture 51 Task P-17: CyberSec Requirement Definition

Lecture 52 Task P-18: SYSTEM REGISTRATION

Lecture 53 Task P-18: CyberSec System Registration

Section 4: 2. Categorize

Lecture 54 CATEGORIZE

Lecture 55 TASK C-1 - SYSTEM DESCRIPTION

Lecture 56 Task C-1: CyberSec System Description

Lecture 57 Task C-2: SECURITY CATEGORIZATION

Lecture 58 Task C-2: CyberSec Security Categorization

Lecture 59 Task C-3: SECURITY CATEGORIZATION REVIEW AND APPROVAL

Lecture 60 Task C-3: CyberSec CRM Categorization Review and Approval

Section 5: 3. Select

Lecture 61 Step 3 -SELECT

Lecture 62 Task S-1 - CONTROL SELECTION

Lecture 63 Task S-1: CyberSec Control Selection

Lecture 64 Task S-2: CONTROL TAILORING

Lecture 65 Task S-2: CyberSec Control Tailoring

Lecture 66 Task S-3: CONTROL ALLOCATION

Lecture 67 Task S-3: CyberSec Control Allocation

Lecture 68 Task S-4 DOCUMENTATION OF PLANNED CONTROL IMPLEMENTATIONS

Lecture 69 Task S-4: CyberSec Documentation of Control Implementation

Lecture 70 Task S-5: CONTINUOUS MONITORING STRATEGY-SYSTEM

Lecture 71 Task S-5: CyberSec Continuous Monitoring Strategy

Lecture 72 Task S-6: PLAN REVIEW AND APPROVAL

Section 6: 4. Implement

Lecture 73 Step 4: Implement

Lecture 74 Task I-1: CONTROL IMPLEMENTATION

Lecture 75 Task I-1: CyberSec Control Implementation

Lecture 76 Task I-2: UPDATE CONTROL IMPLEMENTATION INFORMATION

Lecture 77 Task I-2: Update CyberSec CRM Implementation Information

Section 7: 5. Assess

Lecture 78 Step 5 -Assess

Lecture 79 Task A-1: ASSESSOR SELECTION

Lecture 80 Task A-1: Assessor Selection at CyberSec

Lecture 81 Task A-2: ASSESSMENT PLAN

Lecture 82 TASK A-2: CyberSec Assessment Plan

Lecture 83 Task A-3: CONTROL ASSESSMENTS

Lecture 84 Task A-3 CyberSec Control Assessments

Lecture 85 Task A-4: ASSESSMENT REPORTS

Lecture 86 Task A-4: CyberSec Assessment Reports

Lecture 87 Task A-5: REMEDIATION ACTIONS

Lecture 88 Task A-5: CyberSec Remediations Actions

Lecture 89 Task A-6: PLAN OF ACTION AND MILESTONES

Lecture 90 Task A-6: CyberSec Plan of Actions and Milestones

Section 8: 6. Authorize

Lecture 91 Step 6: Authorize

Lecture 92 Task R-1: AUTHORIZATION PACKAGE

Lecture 93 Task R-1: CyberSec Authorization Package

Lecture 94 TASK R-2: RISK ANALYSIS AND DETERMINATION

Lecture 95 Task R-2: CyberSec Risk Analysis and Determination

Lecture 96 Task R-3: RISK RESPONSE

Lecture 97 Task R-3: CyberSec Risk Response

Lecture 98 Task R-4: AUTHORIZATION DECISION

Lecture 99 Task R-4: CyberSec Authorization Decision

Lecture 100 Task R-5: AUTHORIZATION REPORTING

Lecture 101 Task R-5: CyberSec Authorization Reporting

Section 9: 7. Monitor

Lecture 102 Step 7: Monitor

Lecture 103 Task M-1: SYSTEM AND ENVIRONMENT CHANGES

Lecture 104 Task M-1: System and Environment Change for CyberSec

Lecture 105 Task M-2: ONGOING ASSESSMENTS

Lecture 106 Task M-2: CyberSec Ongoing Assessments

Lecture 107 TASK M-3: ONGOING RISK RESPONSE

Lecture 108 Task M-3: Ongoing Risk Response in CyberSec

Lecture 109 Task M-4: AUTHORIZATION PACKAGE UPDATES

Lecture 110 Task M-4: Authorization Package Updates for CyberSec

Lecture 111 TASK M-5: SECURITY AND PRIVACY REPORTING

Lecture 112 Task M-5 - CyberSec Security and Privacy Reporting

Lecture 113 Task M-6: ONGOING AUTHORIZATION

Lecture 114 Task M-6: Ongoing Authorization at CyberSec

Lecture 115 Task M-7: SYSTEM DISPOSAL

Lecture 116 Task M-7: CyberSec System Disposal

Section 10: Conclusion

Lecture 117 Conclusion

Cybersecurity Analysts: Those seeking to comprehend and implement RMF tasks to bolster organizational security.,Risk Management Consultants: Professionals aspiring to provide comprehensive RMF-based guidance to clients across industries.,IT Managers and CISOs: Leaders responsible for overseeing and improving their organization's security posture.,System Administrators: Technical staff who implement and manage security measures within IT systems.,Compliance Officers: Individuals ensuring that organizations meet federal cybersecurity requirements and standards.,Privacy Officers: Professionals focused on integrating privacy into risk management frameworks.,Security Architects: Designers of systems who need to embed RMF principles into the architecture from the ground up.,Students of Information Security: Those currently studying and looking to augment their knowledge with practical, real-world applications of RMF.,Federal Employees: Government workers who must adhere to RMF in their operational duties.,Project Managers: Individuals leading projects that include RMF as a component of their cybersecurity strategy.