• duration
    4 days
  • Award Winning
    RMF Courseware
  • (ISC)2 CAP
    Exam Review
  • DoD/IC Focused RMF
    Boot Camp

Learn the federal authorization process and gain an understanding of the Risk Management Framework.

Rick Management Framework (RMF) V2.0 for Federal Agencies

Our Risk Management Framework (RMF) V2.0 for Federal Agencies course is a 4-day comprehensive deep dive into the Risk Management Framework prescribed by NIST Standards.

During this course, you will participate in scenario-based exercises to enhance understanding of the processes used for system authorization, including all of the elements of the Risk Management Framework. It is designed for federal employees and contractors in non-DoD agencies, and for any supporting vendors and service providers.

CAP Exam Bonus Content

This RMF training course will also help students review and refresh their knowledge and identify areas they need to study for the Certified Authorization Professional exam.

Why Training Camp?

With our 20 years of training experience, our team is experienced in the nuances of government information security and compliance. Our goal is to surpass expectations and earning the trust placed in being a partner in your success.

Private Team Training Option

This course can delivered onsite for groups of 5 or more, and can be customized to meet the specific needs of your team. Fill out the form below and our Enterprise Solutions experts will contact you to discuss the best training solutions for your team.


200

Learn Risk Management Framework (RMF), Fast

The Risk Management Framework provides a process that integrates security and risk management activities into the system development life cycle. The risk-based approach to security control selection and specification considers effectiveness, efficiency, and constraints due to applicable laws, directives, Executive Orders, policies, standards, or regulations.

  • Award Winning Instructors

    This RMF course was created by a security expert with more than 30+ years of experience. As the creator and professor of the first graduate computer security course as adjunct faculty with a major Ivy League university, he served in the military for over twenty years and was a project manager for the NSA for five years.

  • (ISC)²'s CAP Exam Support

    This course is updated with the most relevant content to ensure your move to RMF is successful. This course may also be used as a certification preparation for (ISC)²'s CAP program. Earning the CAP certification is a proven way to build your career and demonstrate your expertise within the risk management framework (RMF).

Rick Management Framework (RMF) V2.0 for Federal Agencies Outline

Chapter 1: Introduction
• RMF review
• Key concepts such as assurance, assessment, authorization
• Security controls

Chapter 2: Cybersecurity Policy Regulations & Framework
• Security policy, law, and regulations
• System Development Life Cycle (SLDC)
• Documents for cyber security guidance

Chapter 3: RMF Roles and Responsibilities
• Tasks and responsibilities for RMF roles

Chapter 4: Risk Analysis Process
• Risk management overview
• Risk management process in four steps
• Tasks breakdown
• Risk assessment reporting and options

Chapter 5: Step 1: Categorize
• Step key references and overview
• Sample SSP
• Task 1-1: Security Categorization
• Task 1-2: Information System Description
• Task 1-3: Information System Registration
• Lab: The Security Awareness Agency

Chapter 6: Step 2: Select
• Step key references and overview
• Task 2-1: Common Control Identification
• Task 2-2: Select Security Controls
• Task 2-3: Monitoring Strategy
• Task 2-4: Security Plan Approval
• Lab: Select Security Controls

Chapter 7: Step 3: Implement
• Step key references and overview
• Task 3-1: Security Control Implementation
• Task 3.2: Security Control Documentation
• Lab: Security Control Implementation

Chapter 8: Step 4: Assess
• Step key references and overview
• Task 4-1: Assessment Preparation
• Task 4-2: Security Control Assessment
• Task 4-3: Security Assessment Report
• Task 4-4: Remediation Actions
• Task 4-5: Final Assessment Report
• Lab: Assessment Preparation

Chapter 9: Step 5: Authorize
• Step key references and overview
• Task 5-1: Plan of Action and Milestones
• Task 5-2: Security Authorization Package
• Task 5-3: Risk Determination
• Task 5-4: Risk Acceptance
• Lab Step 5: Authorizing Information Systems

Chapter 10: Step 6: Monitor
• Step key references and overview
• Task 6-1: Information System & Environment Changes
• Task 6-2: Ongoing Security Control Assessments
• Task 6-3: Ongoing Remediation Actions
• Task 6-4: Key Updates
• Task 6-5: Security Status Reporting
• Task 6-6: Ongoing Risk Determination & Acceptance
• Task 6-7: Information System Removal & Decommissioning

• Continuous Monitoring
• Security Automation Domains
• Lab: Info System & Environment Changes
• Appendix A: Supplement Reference
• Appendix B: RMF/CAP Review and Step Checklists
• Appendix C: Acronym Reference
• Appendix D: Answer Keys
• Answers to Review Questions
• Lab Exercise Answers

Chapter 6: Step 2: Select
• Step key references and overview
• Task 2-1: Common Control Identification
• Task 2-2: Select Security Controls
• Task 2-3: Monitoring Strategy
• Task 2-4: Security Plan Approval
• Lab: Select Security Controls

Chapter 7: Step 3: Implement
• Step key references and overview
• Task 3-1: Security Control Implementation
• Task 3.2: Security Control Documentation
• Lab: Security Control Implementation

Chapter 8: Step 4: Assess
• Step key references and overview
• Task 4-1: Assessment Preparation
• Task 4-2: Security Control Assessment
• Task 4-3: Security Assessment Report
• Task 4-4: Remediation Actions
• Task 4-5: Final Assessment Report
• Lab: Assessment Preparation

Chapter 9: Step 5: Authorize
• Step key references and overview
• Task 5-1: Plan of Action and Milestones
• Task 5-2: Security Authorization Package
• Task 5-3: Risk Determination
• Task 5-4: Risk Acceptance
• Lab Step 5: Authorizing Information Systems

Chapter 10: Step 6: Monitor
• Step key references and overview
• Task 6-1: Information System & Environment Changes
• Task 6-2: Ongoing Security Control Assessments
• Task 6-3: Ongoing Remediation Actions
• Task 6-4: Key Updates
• Task 6-5: Security Status Reporting
• Task 6-6: Ongoing Risk Determination & Acceptance
• Task 6-7: Information System Removal & Decommissioning

• Continuous Monitoring
• Security Automation Domains
• Lab: Info System & Environment Changes
• Appendix A: Supplement Reference
• Appendix B: RMF/CAP Review and Step Checklists
• Appendix C: Acronym Reference
• Appendix D: Answer Keys
• Answers to Review Questions
• Lab Exercise Answers

  • Self-Paced Training

    Looking to learn at your pace?

    Learn More
  • PRIVATE GROUP TRAINING

    More information about bringing an event to you.

    More Information
  • Special Offers

    Browse discounted Training Camp offers.

    Learn More

Testimonials

As a veteran Training Camp offered me the opportunity to enhance my learning and change my field of work into a rapidly growing market. Definitely worth it!
Brandon McCartney
Although the course material is tough and sometimes seems daunting, the instructors are effective in getting through it.
Daniel Y
The training camp experience was great, informative, and just what I needed to jump start my training in RMF.
Lionel B HMS
The Training Camp experience was well organized and super-informative. The instructor's experience and ability to communicate made the training worth more than it's weight in gold! I highly recommend the CISSP course at Training Camp!
CL SecureStrux, LLC
CISSP instructor Ross Everett-knowledgeable, thorough and very easily understood. The location of class room was great in the metro D.C. Area. Hotel package was a fantastic deal. Going to return for cloud certs in no time.
Jia Hedman Leidos
I recommend taking this boot camp with Training Camp. The instructor was excellent, answered any questions that came up, discussed the topics thoroughly and was clear about the subject matter we were to cover.
HS U.S. Army
A must stop-by resort before any certification test. Teachers teach you something for life, rather than only for certification.
Zubir Ahmad
Training camp got me up to speed on the domains that I hadn't had tons of experience and in the end this made all the difference to ensure I attained my certification.
JS EZe Software Group
The Training Camp provided a great training environment for my Security+ certification. Feeding me information and knowledge through a fire hose was exactly what was needed for my study style. I will definitely consider Training Camp in the future.
Luke Swearingen Harris
The class was very interactive with students providing their real world experience to supplement the course material.
Chris Louie IronKey by Imation
01 010