Training Courses

Course Catalog

  1. JSIG Risk Management Framework(Jump to dates and locations) This is a three-day, instructor-led, course on Joint Special Access Program (SAP) Implementation Guide (JSIG) Risk Management Framework (RMF) principles. The goal is to provide knowledge and skills to ISSMs, ISSOs, ISSEs, and Assessors responsible for implementing and assessing security policies, practices, and technologies in accordance with Risk Management Framework, JSIG, IC, and DoD Guidance. Our trainers have firsthand subject matter expertise with the training content, which results in a dynamic and impactful training experience. Bring your unclassified questions! You’ll have the ability to ask them in class and share experiences with both the instructor and other students. This is a key aspect of this training experience. Dates, Locations and More Info
  2. RMF for ISSEs Tools Training – This course equips Information System Security Engineers (ISSEs) with the necessary tools and techniques for implementing the Risk Management Framework (RMF) effectively. Through a combination of case studies, hands-on exercises, and tool demonstrations, participants will gain practical insights into threat impacts, vulnerability management, compliance checking, and assessment automation using industry-standard tools such as ACAS, SCAP Compliance Checker (SCC), and STIG Viewer. (Duration: 5 days)
  3. RMF for ISSOs Tools Training – This course is designed to equip Information System Security Officers (ISSOs) with the essential skills and tools necessary to navigate through the Risk Management Framework (RMF) process efficiently. Through a series of structured lessons, participants will learn how to effectively implement each step of the RMF, from defining the authorization boundary to drafting authorization documentation, including Security Plans, Security Assessment Plans, and Plans of Action and Milestones (POA&Ms). The course will also cover continuous monitoring planning to ensure ongoing compliance and risk management. (Duration: 5 days)
  4. Information Systems Security for ISSOs – This course provides a comprehensive overview of Information Systems Security for Information Systems Security Officers (ISSOs). Participants will gain foundational knowledge and practical skills necessary for effectively securing information systems within an organizational context. Through a series of interactive lessons, participants will explore key topics including access control, security architecture, risk management, cryptography, incident response, and legal compliance. Emphasis will be placed on understanding the role of an ISSO, identifying security vulnerabilities, implementing appropriate security measures, and ensuring compliance with relevant regulations and standards. (Duration: 4 days)
  5. Risk Management Framework for the U.S. Army – This course is designed to provide participants with a comprehensive understanding of the Risk Management Framework (RMF) tailored for the U.S. Army environment. Participants will explore the background, purpose, and key principles of RMF, focusing specifically on its application within the context of Army information systems and networks. Through a series of interactive lessons, participants will learn about identifying risks, vulnerabilities, and threats, as well as the roles and responsibilities involved in RMF implementation. Practical guidance, case studies, and real-world examples will be provided to enhance understanding and application of RMF processes, including steps for categorizing information systems, selecting and implementing security controls, and continuous monitoring. The course will also cover relevant Army-specific frameworks and tools, such as Army 2.0 and the use of eMASS for RMF documentation and management. (Duration: 4 days)
  6. Modern Cybersecurity Risk Management and Compliance – This comprehensive course provides a deep dive into cybersecurity risk management and compliance frameworks, equipping participants with the knowledge and skills necessary to navigate today’s complex threat landscape effectively. By the end of this course, participants will be exposed to modern cybersecurity risk management and compliance, empowering them to proactively mitigate risks, ensure regulatory compliance, and safeguard their organizations against cyber threats in an ever-evolving digital landscape. (Duration: 3 days)
  7. Cloud Security and Compliance – This course provides a comprehensive understanding of cloud security and compliance, covering essential topics such as cyber threats, security operations centers (SOC), best practices, and real-world applications. (Duration: 2 days)
  8. eMASS – This course serves as an introduction to the Enterprise Mission Assurance Support Service (eMASS) application with a focus on support of Risk Management Framework (RMF), Continuous Monitoring, and Enterprise Reporting. (Duration: 2 hours)
  9. Cybersecurity Awareness for Small & Medium Sized Businesses (SMBs) – This course explores the importance of cybersecurity in today’s digital landscape and provides practical insights into implementing best practices to protect businesses against cyber threats. (Duration: 2 hours)
  10. Compliance: FTC Safeguards Rule, Financial Services – This course offers an exploration of the Federal Trade Commission (FTC) Safeguards Rule, specifically tailored for professionals in the financial services sector. (Duration: 1 hour)
  11. FTC Safeguards Rule, Higher Education Institutions (HEIs) – This course provides a detailed examination of the Federal Trade Commission (FTC) Safeguards Rule tailored for higher education institutions. (Duration: 1 hour)
  12. Cybersecurity Awareness Training – This introductory course is designed to enhance cybersecurity awareness and knowledge among employees by equipping them with the skills needed to recognize and respond effectively to cyber threats. (Duration: 1 hour)
  13. Risk Management Framework / FISMA and FedRAMP – This course is tailored for senior executives to understand the importance of cybersecurity risk management within the context of the Federal Information Security Management Act (FISMA), Risk Management Framework (RMF), and Federal Risk and Authorization Management Program (FedRAMP). (Duration: 1 hour)
  14. Protect Your Organization While Leveraging AI – This course provides a comprehensive understanding of leveraging artificial intelligence (AI) technologies within an organizational context while ensuring compliance with regulations and securing AI systems in real-world scenarios. (Duration: 1 hour)

JSIG RMF Course Schedule

Need a Dedicated Course at your site? Contact us! 443-718-0670
Charleston, SCCharleston, SC August 19-21, 2024
Holiday Inn & Suites Airport/Convention Center Area
3025 West Montague Avenue, North Charleston, SC 29418
8AM-5PM each day
$2,150/seat
San Antonio, TXSan Antonio, TX November 4-6, 2024
Holiday Inn San Antonio – Six Flags
11010 Interstate 10 West, San Antonio, TX 78230
8AM-5PM each day
$2,150/seat
WPAFB, OH areaWPAFB, OH area Dec 9-11, 2024
Hilton Garden Inn Beavercreek, OH
3520 Pentagon Park Blvd, Dayton, OH 45431
8AM-5PM each day
$2,150/seat
Need a Dedicated Course at your site? Contact us! 443-718-0670

Testimonials

“Instructor was great. Clear, extremely knowledgeable, patient, personable, professional, and was able to communicate a traditionally dry topic in an interesting / fascinating manner”

– JSIG RMF Course student

“Pop up questions and discussions were incredibly valuable”

– JSIG RMF Course student

“Great stuff! Can’t wait to get back and start applying it”

– JSIG RMF Course student

Training Details

JSIG Risk Management Framework (RMF) course outline:

  1. Introductions and Course Overview
  2. Introduce RMF Background and Purpose
  3. Discuss Risks, Vulnerabilities, and Threats
  4. Categorizing Information Systems and Identify Information Types
  5. Discuss Risk Management and Risk Assessments
  6. Perform a detailed analysis of the RMF process steps
  7. Describe Information System (IS) components
  8. Gain awareness of System Security Plan (SSP)
  9. Discuss Security Controls Traceability Matrix (SCTM) and Implementing Security Controls
  10. Creating Authorization Package and Authorization to Operate (ATO)
  11. Continuous Monitoring for Isolated Networks
  12. Ongoing Authorization Program
  13. Gain awareness of FedRAMP and CMMC
  14. Best Practices, Tools, and Resources

Additional JSIG RMF Course Details

Successful completion of this course provides students the knowledge to:

  • Describe the history, laws, policies, and other governance pertaining to RMF
  • Recognize various tools that can assist throughout the RMF process
  • Employ Continuous Monitoring Strategies
  • Explain each step of the RMF process
  • Conduct a Risk Assessment
  • Create a System Security Plan

No-Shows: We strive to meet the customer need. However, if a student doesn’t show for a scheduled course, the customer forfeits payment.

Upon successful completion, a course completion certification will be provided. The name provided during course registration, including any Prefix and/or Suffix, will be the name printed on the certificate.

Maintaining Your 8570 Certification Requirements: 24 instructional hours

Need training at your site? We can do that. Contact us for details at info@cyberawaretech.com.

Need SF-182 details? Check the Eventbrite page linked above, at the bottom of the page.

Cancellation and Change Policy: Cancellation or Change Requests must be received 10 business days before the start date of an event for a full refund minus applicable fees.

About the Team

CyberAware Technologies is a cybersecurity training and consulting company founded in 2019 by Ted Kula, a PMP-certified industry professional with 25 years’ DoD contracting experience, with specific focus in sanitization software and IC training.

TCecure, LLC is a cybersecurity services and solutions company providing security architecture and engineering, software assurance, assessments, training, and consulting to public sector and commercial clients. CEO: Tina Williams-Koroma.

CAT Logo

Training Resources