With course list structured data, you can provide more information about your courses so that prospective students find your courses through Google Search. You can provide details including the course name, who's offering it, and a short description.
There are two course rich result features that use the same schema.org Course type. If your site provides information about courses, you can be eligible for both features by following both implementation guides:
Structured data is a standardized format for providing information about a page and classifying the page content. If you're new to structured data, you can learn more about how structured data works.
You must include the required properties for your content to be eligible for display as a rich result. You can also include the recommended properties to add more information about your content, which could provide a better user experience.
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Maintenance Outage Extended - Friday, October 27th, 2023Maintenance outage has been extended. Estimated time to completion is unknown. Some services will not be availalbe during this time including Admissions, Student Portal, Independent Study Exams. We apologize for the short notice and appreciate your understanding. Sceduled MaintenanceWe will be performing scheduled maintenance on Thursday, 7/11/2024 at 7:00 AM ET. Service is expected to be restored by 10:00 AM ET. However, this could run over. During this time Independent Study exams, Online Admissions, NETC Transportation, IMDA, STAR and the EMI Student Portal will not be available. Please contact us if you experience any issues outside of this maintenance window.
ICS 100, Introduction to the Incident Command System, introduces the Incident Command System (ICS) and provides the foundation for higher level ICS training. This course describes the history, features and principles, and organizational structure of the Incident Command System. It also explains the relationship between ICS and the National Incident Management System (NIMS). The Emergency Management Institute developed its ICS courses collaboratively with:
The purpose of these courses is to provide those new to risk management with an introduction to key publications associated with the NIST Risk Management Framework (RMF) methodology for managing cybersecurity and privacy risk.
The RMF Online Introductory Courses are developed by NIST and available on-demand, and free of charge. Please refer first to the FAQ below for questions about course logistics, topics and content, initial troubleshooting of issues, and certificate of completion and course credit before reaching out to the team with questions.
The purpose of this course is to provide people new to risk management with an overview of a methodology for managing organizational risk in accordance with NIST Special Publication (SP) 800-37, Revision 2. For individuals with experience with NIST SP 800-37, Revision 1, this course explains updates to the RMF in Revision 2, including the integration of privacy and supply chain risk management into this holistic process. The RMF provides a disciplined, structured, and flexible process for managing security and privacy risk that includes information security categorization; control selection, implementation, and assessment; system and common control authorizations; and continuous monitoring.
This course describes at a high-level the importance of establishing an organization-wide risk management program, the information security legislation related to organizational risk management, the steps in the RMF, and the NIST publications related to each step.
NIST SP 800-53 provides a comprehensive catalog of outcome-based security and privacy controls. The controls can be implemented in organizations of all types and sizes, as well as any type of system. The controls provide the safeguards to protect the confidentiality, integrity, and available of the systems and information, and manage privacy risks.
This course introduces the structure and organization of the security and privacy controls in Revision 5 of the catalog. It also describes key considerations for the implementation of controls as part of an organization-wide risk management program.
NIST SP 800-53A introduces an control assessment methodology and set of assessment procedures for the SP 800-53 controls. Control assessments are critical for understanding the overall effectiveness of implemented controls, and is essential in determining risk.
This course introduces the structure and organization of the Revision 5 assessment procedures. It also describes, a methodology to build and tailor effective assessment plans, and how to report, analyze, and manage assessment results as part of an organization-wide risk management program.
NIST SP 800-53B establishes security and privacy control baselines for systems and organizations, and provides tailoring guidance for those baselines. The security and privacy control baselines were developed specifically for federal systems but can serve as a starting point for any organization.
Control baselines are collection of controls from SP 800-53 assembled to address specific protection needs for the low-impact, moderate-impact, high-impact systems, and meet privacy program requirements under Office of Management and Budget (OMB) Circular A-130.
This course introduces the structure and organization of the SP 800-53B security and privacy control baselines, and guidance on tailoring and development of control overlays to facilitate control baseline customization for specific communities of interest, technologies, and environments of operation.
Note SP 800-53B is a companion document to SP 800-53 Revision 5.
A: The course presentations have been designed and developed to meet our responsibilities under Section 508 of the Rehabilitation Act. The presentation player provides a screen-reading option in the upper-left corner of the web site that works with assistive technologies. The screen-reading option may not be available on some tablet or smart phone devices.
The SP 800-53B introductory course provides guidance for selecting controls from the SP 800-53 control catalog using security and privacy control baselines. This includes tailoring the selection of controls to best support the management of organizational and system risks.
A: Topics in the courses are addressed at a high-level, with references to supporting material. Individuals new to cybersecurity can benefit from reviewing NIST SP 800-12, An Introduction to Information Security, which explains basic cybersecurity concepts that can provide additional context to the material and examples presented in the course.
A: There is no defined order for completing the courses. It may be helpful to understand the central concepts of the NIST Risk Management Framework (RMF) before starting the NIST SP 800-53 series courses, but it is not required.
A: You can leave the course at any time and resume it from where you left off by enabling cookies for this website in your browser. If you are using the browser in private or incognito mode, cookies are deleted after the browser is closed and the course cannot be resumed.
A: This could be caused by many different issues. We recommend checking your internet connection, enabling cookies (so progress information can be temporarily saved), refreshing the page or restarting the internet browser, or trying the site again later.
A: At the end of each course presented on this NIST website, a certificate of course completion is provided as a courtesy. The certificate only identifies that the course material was viewed and does not attest to any qualifications, knowledge, or skill level resulting from the completion of the course.
A: NIST does not issue CEC or CPE credits. Individuals who complete the online courses can capture the certificate, add their name and the date of course completion to the certificate.
A: Slides for each course are available in PowerPoint format and includes transcription of the narration in the slide notes. To download a copy of the slides, users must review and agree to the terms of use for each course. Refer to the "Download Slides" button to access the terms of use that correspond with each course above.
If you are unable to access the Google Form to access the terms of use, please download and submit the PDF form and submit to sec-...@nist.gov. Please allow up to 5 business days for response if you submit the PDF form.
The narrated course content is available in a variety of Learning Management System (LMS) formats, including AICC, cmi5, Experience API (xAPI), and SCORM (1.2, 2004). To request a copy of the course materials for Learning Management System (LMS) formats, contact the NIST Risk Management Framework (RMF) Team at sec-...@nist.gov. Please indicate the course requested, the required format, and a valid email address for receiving the requested material.
A: You may present the course materials to support your own cybersecurity learning program; however, attribution to NIST is appreciated. The use of certain NIST-produced content requires permission. Please contact the NIST Risk Management Framework (RMF) Team at sec-...@nist.gov if you have any questions about using the course materials as part of your curriculum.
A: The NIST Risk Management Framework (RMF) Team does not have instructors to teach these courses. If you are interested in having a representative from the NIST RMF Team present a more in-depth topic related to the RMF and supporting publications at an upcoming meeting or event, please complete and submit the speaker request form at least 2 weeks prior to the event, and allow up to 5 business days for a decision on the request to be made.
93ddb68554