NIST Cybersecurity and Risk Management Frameworks
Apply, adapt, respond, and recover using the NIST framework21 H 20 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayEpisodes
Episodes
- Topic 1:NIST Cybersecurity Overview
- Course Overview
- NIST Cybersecurity and Publications
- NIST Relationships
- NIST CSF & RMF Overview
- NIST CSF Core, Tiers, and Profiles
- The Vocabulary of Risk
- NIST Frameworks & Standards Case Study
- Topic 2: NIST CSF Identify
- NIST Core Review and Identify Function Overview
- Inventory of Critical Assets
- Business Impact Assessment
- Security Policies and Procedures
- Topic 3: NIST CSF Protect Function
- NIST Core Review and Protect Function Overview
- Awareness & Training
- Access Control
- Protective Technology - Network
- Protective Technology - Systems
- Data Security and Encryption
- Maintenance
- Personnel and Physical Security
- Topic 4: NIST CSF Detect Function
- System Auditing and Logging
- Monitoring and Alerting
- Assessments
- Topic 5: NIST CSF Respond Function
- Response Planning
- Incident Response Plan Examples
- Digital Forensics
- Response Training and Testing
- Mitigation and Improvements
- Topic 6: NIST CSF Recover Function
- Continuity of Operations Plan
- Backup and Recovery
- Virtualization and the Cloud
- Topic 7: NIST RMF Preparation
- NIST RMF Overview & Preparation
- A Risk-Based Approach to Security
- The RMF Preparation Step
- System Security Plan (SSP)
- Topic 8: NIST RMF Categorization
- Categorizing Information Systems
- Establishing Scope
- The RMF Categorize Step
- Categorization Risk Analysis
- Topic 9: NIST RMF Control Selection
- Selecting Security Controls
- NIST Control Documents
- Setting and Tailoring Control Baselines
- Control Allocation and Monitoring
- Documentation and Approval
- Topic 10: NIST RMF Control Implementation
- Security Control Implementation
- Common Controls
- Documenting Controls
- Topic 11: NIST RMF Control Assessment
- NIST RMF Assessment Step and Process
- Assessment Plan
- Conducting the Assessment
- Analyzing Assessment Results
- Assessment Documentation
- Risk Remediation
- Topic 12: NIST RMF Authorization
- System Authorization
- Risk Response
- Topic 13: NIST RMF Risk Monitoring
- Monitoring Controls Step
- Change Management and Configuration Control
- System Disposal (EOL)
Course Overview
3 M



- Episode Description
- Transcript
NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data. In this course, you will apply the NIST Cybersecurity and Risk Management Frameworks to better protect their infrastructure, detect possible cyber incidents and appropriately respond and recover should they occur. You'll become well-versed in the NIST CSF and RMF, how to implement them, and ways to effectively manage CSF & RMF processes for optimal security, privacy and compliance.