Certified Risk Management Framework Analyst (CRMFA) E-Learning and Exam

This self-study package from Mile2 contains: Course video, e-book, e-prep Guide, E-lab Guide, Exam Simulator, 1 week Cyberrange, 1 Year Courseware Access and 1 Year Exam Voucher.

  • Aan de slag!
  • Offerte aanvragen

    Offerte aanvraag training

    Vul hier al je gegevens in waarvoor je een offerte wilt ontvangen.

    "*" geeft vereiste velden aan

    Vul hier jouw naam in*
    Zou je hieronder de informatie die we nodig hebben willen invullen? Denk aan het aantal deelnemers voor de offerte, eventuele specifieke wensen, en dergelijke.

    Wij zijn dé IT-opleider van het noorden

    • Train bij ons in Drachten of op jouw eigen locatie.
    • Klanten geven ons een 9.2
    • Erkende trainers.
    • Ontvang een certificaat na deelname!

    Kom je er niet uit?
    Laat ons je helpen!

    Contact opnemen

    x

Direct aan de slag!

  • Studeer in je eigen tijd en tempo
  • 365 Dagen toegang
  • Taal: Engels

€1249,- Excl. BTW

Algemene omschrijving

This self-study package from Mile2 contains: Course video, e-book, e-prep Guide, E-lab Guide, Exam Simulator, 1 week Cyberrange, 1 Year Courseware Access and 1 Year Exam Voucher.

This course was created as a standard to measure the set of skills that specific members of an organization are required to have for the practice of certifying, reviewing, and accrediting the security of information systems.

Specifically, this training was designed for the individuals who are responsible for creating and implementing the processes used to evaluate risk and institute security baselines and requirements. These critical decisions will be essential in making sure that the security of the information systems outweighs the potential risks to an organization from any internal or external threats.

Doelgroep

  • IS Security Owners.
  • Security Officers.
  • Ethical Hackers.
  • Information Owners.
  • Penetration Testers.
  • System Owners and Managers.
  • Cyber Security Engineers.

Leerdoelen

Knowledge

  • Computer Networking.
  • Risk Management Framework.
  • Cybersecurity Principles.
  • Data Backup and Recovery.
  • Privacy Principles.
  • Detection Methodologies.
  • Resource Management.
  • Incident Response.

Skills

  • Integration of hardware and software.
  • Developing and applying security system access controls.

Abilities

  • Conduct vulnerability scans.
  • Apply cybersecurity and privacy principles.

Voorkennis

This is an advanced look into how the RMF applies to government systems. 4-5 years of information systems security management is suggested (or equivalent education).

Onderwerpen

Modules

  • Introduction.
  • Module 1 – Introduction to the RMF.
  • Module 2 – The Software Development Life Cycle.
  • Module 3 – RMF Stage 1.
  • Module 4 – RMF Stage 2.
  • Module 5 – RMF Stage 3.
  • Module 6 – RMF Stage 4.
  • Module 7 – RMF Step 5.
  • Module 8 – RMF Step 6.

Labs

  • Introduction.
  • Lab 1 – RMF Structure.
  • Lab 2 – RMF Integration into the SDLC.
  • Lab 3 – RMF Implementation: Prepare.
  • Lab 4 – RMF Implementation: Categorize.
  • Lab 5 – RMF Implementation: Select.
  • Lab 6 – RMF Implementation: Implement.
  • Lab 7 – RMF Implementation: Assess.
  • Lab 8 – RMF Implementation: Authorize.
  • Lab 9 – RMF Implementation: Monitor.