RMF steps Course
2 hours, 4 minutes
Course description
This course describes the RMF and provides guidelines for applying it to information systems and organizations. We discuss the RMF structured and flexible process for managing security and privacy risk, as well as RMF activities to prepare organizations to execute the framework at appropriate risk management levels.Syllabus
Step 6: Continuous Monitoring
Video - 00:24:00
This video describes RMF Step 6: Continuous Monitoring Process.
Step 5: Authorize the System
Video - 00:22:00
This video describes RMF Step 5: Authorize the System.
Step 4: Assess Selected Controls
Video - 00:15:00
This video describes RMF Step 4: Assess Selected Controls.
Step 3: Implement Selected Baseline Controls
Video - 00:24:00
This video describes RMF Step 3: Implement Selected Baseline Controls.
Step 2: Select Control Baseline
Video - 00:14:00
This video describes RMF Step 2: Select Control Baseline.
Step 1: Categorization
Video - 00:19:00
This video describes RMF Step 1: Categorization.
RMF phases
Video - 00:06:00
This video describes the RMF phases and security authorization process.
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
Infosec Skills Teams
$799 per license / year
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps