×
Phoenix TS

Information Systems Continuous Monitoring (ISCM)

Course Overview

An ISCM program is established to collect information in accordance with preestablished metrics, utilizing information readily available in part through implemented security controls. This course teaches participants to assess and analyze security control effectiveness and organizational security status in accordance with organizational risk tolerance. 

At the conclusion of this course, participants will be able to do the following:

  • Identify how risk management helps protect government assets
  • Examine Information Security Continuous Monitoring (ISCM) support of the three-tiered approach to risk management
  • Describe how configuration management controls enable continuous monitoring
  • Examine audit log support to continuous monitoring
  • Understand counterintelligence and cybersecurity personnel support to continuous monitoring

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 240-667-7757.

Course Outline

Module 1: Overview 

  • Background and History 
  • Relationship to Other Publications 
  • Purpose 
  • Target Audience 

Module 2: The Fundamentals 

  • Organization-Wide View of ISCM 
  • Ongoing System Authorizations 
  • Role of Automation in ISCM 
  • ISCM Roles and Responsibilities 

Module 3: The Process 

  • Define ISCM Strategy 
  • Establish An ISCM Program 
  • Implement an ISCM Program 
  • Analyze Data and Report Findings 
  • Respond to Findings 
  • Review and Update the Monitoring Program and Strategy 
Subscribe now

Get new class alerts, promotions, and blog posts