Loading...
Course Description
Certificate | 2 Courses | 36 hours | 3.6 CEUs | $5,290
SEC525 - Applying the Risk Management Framework (RMF) and NIST Controls
24 Hours | 2.4 CEUs | $3,595
- This course is focused on the transition to the new RMF v2.0 that is taking place within federal government departments and agencies, the Department of Defense (DOD) and the Intelligence Community (IC). This course is designed to provide Cybersecurity and Information Security Professionals that are responsible for implementing the unified federal Risk Management Framework (RMF), the knowledge, understanding and practices needed to apply the relevant DoD, NIST and CNSS publications to their work environment. Students will gain an understanding of the Risk Management Framework; associated risk management and assessment processes; implementation practices, techniques and technologies; roles and responsibilities; and artifacts development leading to U.S. Government information system authorization. Students will also learn and discuss the RMF seven (7) step process integrated with the System Development Life Cycle to include roles and responsibilities; references; and guidelines. They will complete exercises relevant to executing the RMF - for example, how to prepare for the RMF, categorize an information system, select security controls, and complete various RMF artifacts for system authorization. Students will also learn and discuss the technologies, best practices, and procedures used in the implementing the RMF. Other topics include life cycle activities in the DoD Instruction 8510.01 (RMF for DoD IT), NIST Special Publication (SP) 800-53 Security Controls, NIST assessment procedures, and enhancements from CNSS Instruction 1253. Training will include lectures and class discussions, class hands-on activities as well as individual hands-on activities, case studies, and individual and team exercises.
PES100 - Cryptography Fundamentals
12 Hours | 1.2 CEUs | $1,695
- In this course students learn the fundamentals of cryptography, which is a necessary tool for protecting information in computer systems. Topics include security and cryptography, stream and block ciphers, symmetric and asymmetric encryption, public key infrastructure (PKI) encryption, public key encryption, hash functions, digital signatures, and digital certificates.
Prerequisites
To ensure success in this certificate, students should have completed:
Duration
36 Hours | 3.6 CEUs | 6 Days or 12 NightsLoading...
Enroll Now - Select a section to enroll in
Required fields are indicated by .
*Academic Unit eligibility to be determined by college/university in which you are enrolled in a degree seeking program.
*Academic Unit eligibility to be determined by college/university in which you are enrolled in a degree seeking program.