Analyze control frameworks to choose security controls fitting organizational needs.
Design tailored baselines and document controls per NIST standards.
Assess control implementations, identify gaps, and plan remediation.
Implement continuous monitoring and manage changes for ongoing security.
Earn a shareable certificate to add to your LinkedIn profile.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
In this module, we will explore the process of selecting appropriate security controls within the NIST Risk Management Framework. You will learn how to identify applicable rules and standards, set and tailor control baselines, allocate controls effectively, and document them for approval.
In this module, we will delve into the practical aspects of deploying security controls in cybersecurity. You will learn how to implement, evaluate, and document these controls, ensuring that they meet the necessary standards and requirements.
In this module, we will cover the entire assessment process within the NIST RMF. You will learn to plan, conduct, and document assessments, as well as to identify and remediate risks based on the findings.
In this module, we will focus on the final steps of system authorization and risk response. You will learn about the authorization process, how to document risk responses, and strategies for mitigating identified risks.
In this module, we will examine the continuous monitoring and change control processes in cybersecurity. You will learn to manage system changes, handle configuration control, and evaluate secure methods for system disposal at the end of its lifecycle.