Training Courses

JSIG RMF Training

This is a three-day, instructor-led, course on Joint Special Access Program (SAP) Implementation Guide (JSIG) Risk Management Framework (RMF) principles. The goal is to provide knowledge and skills to ISSMs, ISSOs, ISSEs, and Assessors responsible for implementing and assessing security policies, practices, and technologies in accordance with Risk Management Framework, JSIG, IC, and DoD Guidance. 
Our trainers have firsthand subject matter expertise with the training content, which results in a dynamic and impactful training experience. Bring your unclassified questions! You’ll have the ability to ask them in class and share experiences with both the instructor and other students. This is a key aspect of this training experience. We will be following local, state and national COVID guidelines.

Training Schedule

WPAFB, OH area WPAFB, OH area Dec 4-6, 2023
Hilton Garden Inn Beavercreek, OH
3520 Pentagon Park Blvd
Dayton, OH 45431
8AM-5PM each day
$2,150/seat
Eglin AFB area Eglin AFB area Feb 21-23, 2024 (Wednesday-Friday)
Best Western
106 Bayshore Drive
Niceville, FL 32578
8AM-5PM each day
$2,150/seat
Need a Dedicated Course at your site? Contact us! 443-718-0670

Testimonials

“Instructor was great. Clear, extremely knowledgeable, patient, personable, professional, and was able to communicate a traditionally dry topic in an interesting / fascinating manner”

– JSIG RMF Course student

“Pop up questions and discussions were incredibly valuable”

– JSIG RMF Course student

“Great stuff! Can’t wait to get back and start applying it”

– JSIG RMF Course student

Training Details

JSIG Risk Management Framework (RMF) course outline:

  1. Introductions and Course Overview
  2. Risk Management Framework Overview, Roles and Responsibilities
  3. Categorizing Information Systems
  4. Steps in the RMF process
  5. Selecting Security Controls, Protection Levels, Overlays, and Customizations
  6. Implementing Security Controls
  7. FedRAMP and CMMC Considerations
  8. Assessing Security Controls
  9. Security Authorization
  10. Continuous Monitoring
  11. Useful Tools and Other Resources

Other Course Details

Successful completion of this course provides students the knowledge to:

  • Describe the history, laws, policies, and other governance pertaining to RMF
  • Recognize various tools that can assist throughout the RMF process
  • Employ Continuous Monitoring Strategies
  • Explain each step of the RMF process
  • Conduct a Risk Assessment
  • Create a System Security Plan

No-Shows: We strive to meet the customer need. However, if a student doesn’t show for a scheduled course, the customer forfeits payment.

Upon successful completion, a course completion certification will be provided. The name provided during course registration, including any Prefix and/or Suffix, will be the name printed on the certificate.

Maintaining Your 8570 Certification Requirements: 24 instructional hours

Need training at your site? We can do that. Contact us for details at info@cyberawaretech.com.

Need SF-182 details? Check the Eventbrite page linked above, at the bottom of the page.

Cancellation Policy: Cancellation requests must be received 10 business days before the start date of an event for a full refund minus applicable fees.

About the Team

CyberAware Technologies is a cybersecurity training and consulting company founded in 2019 by Ted Kula, a PMP-certified industry professional with 25 years’ DoD contracting experience, with specific focus in sanitization software and IC training.

TCecure, LLC is a cybersecurity services and solutions company providing security architecture and engineering, software assurance, assessments, training, and consulting to public sector and commercial clients. CEO: Tina Williams-Koroma.

CAT Logo

Training Resources