CHAPTER 1: IT FOUNDATIONAL CONCEPTS (IT SUPPORT)
  • Introduction and Course Description
  • FOUNDATION - WHAT IS A NETWORK?
  • 1.2 Questions
  • FOUNDATION - COMPONENTS OF AN ENTERPRISE NETWORK PART 1
  • 1.3 Questions
  • FOUNDATION - COMPONENTS OF AN ENTERPRISE NETWORK PART 2
  • 1.4 Questions
  • FOUNDATION - COMPONENTS OF AN ENTERPRISE NETWORK PART 3
  • 1.5 Questions
  • FOUNDATION - THE COMPONENTS OF AN ENTERPRISE NETWORK PART 4
  • 1.6 Questions
  • FOUNDATION - WHAT IS THE INTERNET?
  • 1.7 Questions
  • FOUNDATION - THE HUMAN COMPONENT OF NETWORK SUPPORT PART 1
  • 1.8 Questions
  • FOUNDATION - THE HUMAN COMPONENT OF NETWORK SUPPORT PART 2
  • 1.9 Questions
  • FOUNDATION - THE HUMAN COMPONENT OF IT SUPPORT PART 3
  • 1.10 Questions
  • FOUNDATION - MEET THE IT OPERATIONS TEAM
  • FOUNDATION - MEET THE IT-SECURITY TEAM
  • Meet the Teams Questions
CHAPTER 2: FISMA COMPLIANCE – RMF STEPS 1-3
  • FISMA - INTRODUCTION TO FISMA COMPLIANCE
  • 2.1 Questions
  • FISMA - RMF STEP 1 – SECURITY CATEGORIZATION
  • 2.2 Questions
  • FISMA - SECURITY CATEGORIZATION PART 2
  • 2.3 Questions
  • FISMA - RMF STEP 1-SECURITY CATEGORIZATION PART 3
  • 2.4 Questions
  • FISMA - SYSTEM AND TECHNICAL DESCRIPTION PART 1
  • 2.5 Questions
  • FISMA - SYSTEM/TECHNICAL DESCRIPTION PART 2
  • 2.6 Questions
  • FISMA - RMF STEP 2 – SELECT SECURITY CONTROLS
  • 2.7 Questions
  • FISMA - RMF STEP 3 - IMPLEMENT SECURITY CONTROLS
  • 2.8 Questions
  • FISMA - PEP TALK! INTRO TO SIMULATIONS
  • 2.9 Questions
  • FISMA - SIMULATION - COVER PAGE
  • 2.10 Questions
  • FISMA - SIMULATION - SECURITY CATEGORIZATION
  • 2.11 Questions
  • FISMA - DIGITAL IDENTITY Part 1
  • 2.12 Questions
  • FISMA - DIGITAL IDENTITY Part 2
  • 2.13 Questions
  • FISMA - DIGITAL IDENTITY Part 3
  • 2.14 Questions
  • FISMA - SIMULATION - DIGITAL IDENTITY
  • 2.15 Questions
  • SIMULATION - POC
  • FISMA - SIMULATION – GENERAL SYSTEM DESCRIPTION AND USER TYPES
  • 2.16 Questions
  • FISMA - SIMULATION – NETWORK ARCHITECTURE, ENVRIONMENT AND INVENTORY
  • 2.17 Questions
  • FISMA - SIMULATION – SYSTEM INTERCONNECTION, LAWS AND REGULATIONS
  • 2.18 Questions
  • FISMA - SIMULATION – SELECTING CONTROLS (RMF STEP 2)
  • 2.19 Questions
  • FISMA - SIMULATION – IMPLEMENTING SECURITY CONTROLS (RMF STEP 3)
  • 2.20 Questions
  • FISMA - SIMULATION – IMPLEMENTING THE SECURITY CONTROLS PART 2
  • 2.21 Questions
CHAPTER 3 – RMF STEP 4-6 SECURITY ASSESSMENT
  • FISMA - RMF STEP 4: ASSESSING SECURITY CONTROLS
  • 3.1 Questions
  • 3.2. THE SECURITY ASSESSMENT REPORT – FROM OBJECTIVE TO ASSESSMENT RESULT
  • 3.2 Questions
  • FISMA - THE SECURITY ASSESSMENT REPORT - PART 2
  • 3.3 Question
  • FISMA - RMF STEP 5: AUTHORIZE THE INFORMATION SYSTEM
  • 3.4 Questions
  • FISMA - RMF STEP 5 & 6 - SYSTEM AUTHORIZATION AND CONTINUOUS MONITORING
  • 3.5 Question
  • FISMA - SIMULATION – INTRODUCTIONS AND PREPARATION FOR THE ASSESSMENT
  • 3.6 Questions
  • FISMA - SECURITY ASSESSMENT KICK OFF MEETING (DEMO)
  • 3.7 Questions
  • FISMA - SIMULATION - COMPLETING THE SAR PART 1
  • 3.8 Question
  • FISMA - SIMULATION – COMPLETING THE SAR PART 2
  • 3.9 Questions
  • FISMA - SIMULATION – POA&M REPORTS PART 1
  • 3.10 Questions
  • FISMA - SIMULATION – POA&M REPORT PART 2
  • 3.11 Questions
  • FISMA - SIMULATION – AUTHORIZE SYSTEM AND RECEIVE ATO
  • 3.12 Questions
  • Chapter 3.13 Phase 1 Completion - Pep Talk!