• Classroom
  • Online, Self-Paced
Course Description

Successful completion of this exam will demonstrate a candidate's understanding of the application of the Information Security Continuous Monitoring (ISCM) to federal information systems and organizations. The candidate shall demonstrate knowledge of security and privacy controls related to continuous monitoring and shall exercise their understanding of the six-steps of continuous monitoring in accordance with NIST Special Publication 800-137. It is critical for the candidate to understand ISCM definitions, roles, and responsibilities, and supporting NIST Special Publications such as NIST SP 800-37, 800-53, 800-53A, and NIST SP 800-55. The candidate shall demonstrate their ability to follow procedures for conducting assessments of the security and privacy controls that support organizational risk management processes.

Learning Objectives

Successful completion of this exam will demonstrate a candidate's understanding of the application of the Information Security Continuous Monitoring (ISCM) to federal information systems and organizations. The candidate shall demonstrate knowledge of security and privacy controls related to continuous monitoring and shall exercise their understanding of the six-steps of continuous monitoring in accordance with NIST Special Publication 800-137. It is critical for the candidate to understand ISCM definitions, roles, and responsibilities, and supporting NIST Special Publications such as NIST SP 800-37, 800-53, 800-53A, and NIST SP 800-55. The candidate shall demonstrate their ability to follow procedures for conducting assessments of the security and privacy controls that support organizational risk management processes.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.