{"id":11465,"date":"2024-07-10T12:11:30","date_gmt":"2024-07-10T10:11:30","guid":{"rendered":"https:\/\/cyberacademy.altaydagistan.com\/?post_type=mec-events&#038;p=11465"},"modified":"2025-11-25T15:11:23","modified_gmt":"2025-11-25T14:11:23","slug":"crmfa-certified-risk-manager-framework-analyst","status":"publish","type":"mec-events","link":"https:\/\/acgcyberacademy.fr\/en\/events\/crmfa-certified-risk-manager-framework-analyst\/","title":{"rendered":"C)RMFA: Certified Risk Manager Framework Analyst\u00a0"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"11465\" class=\"elementor elementor-11465\" data-elementor-post-type=\"mec-events\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c0c232 e-flex e-con-boxed e-con e-child\" data-id=\"6c0c232\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-42f62ef3 e-flex e-con-boxed e-con e-child\" data-id=\"42f62ef3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b4fad91 elementor-widget elementor-widget-image\" data-id=\"1b4fad91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"359\" height=\"169\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Mile2-logo.jpg\" class=\"attachment-large size-large wp-image-11194\" alt=\"MILE2 ACG CyberAcademy Formation\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Mile2-logo.jpg 359w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Mile2-logo-300x141.jpg 300w\" sizes=\"(max-width: 359px) 100vw, 359px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b0eb856 e-flex e-con-boxed e-con e-child\" data-id=\"5b0eb856\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ad7b056 elementor-widget elementor-widget-heading\" data-id=\"4ad7b056\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Target group<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25da03fa elementor-widget elementor-widget-text-editor\" data-id=\"25da03fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>IS Security Owners<\/li><li>Security Officers<\/li><li>Ethical Hackers<\/li><li>Information Owners<\/li><li>Penetration Testers<\/li><li>System Owners and Managers<\/li><li>Cyber Security Engineers<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d6e3ac1 e-flex e-con-boxed e-con e-child\" data-id=\"5d6e3ac1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d4b68c9 elementor-widget elementor-widget-heading\" data-id=\"4d4b68c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Description <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57a3c7d5 elementor-widget elementor-widget-text-editor\" data-id=\"57a3c7d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Mile2's<strong> Risk Management Framework Analyst<\/strong> training quantifies the process of certifying, reviewing, and accrediting an information system by IT professionals. This course was created as a standard to measure the set of skills that specific members of an organization are required to have for the practice of certifying, reviewing, and accrediting the security of information systems. Specifically, this training was designed for the individuals who are responsible for creating and implementing the processes used to evaluate risk and institute security baselines and requirements. These critical decisions will be essential in making sure that the security of the information systems outweighs the potential risks to an organization from any internal or external threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71419de5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"71419de5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ca12bed elementor-widget elementor-widget-heading\" data-id=\"1ca12bed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Program<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10905e70 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"10905e70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-hourglass-half\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Duration : 3 days<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24ac61e elementor-widget elementor-widget-n-accordion\" data-id=\"24ac61e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Module 1: Fundamentals of System and Network Security\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3840\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-3840\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 0: Introduction  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3840\" class=\"elementor-element elementor-element-ca66182 e-con-full e-flex e-con e-child\" data-id=\"ca66182\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3840\" class=\"elementor-element elementor-element-ecf043e e-flex e-con-boxed e-con e-child\" data-id=\"ecf043e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-baa67de elementor-widget elementor-widget-text-editor\" data-id=\"baa67de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<\/p><ul><li>Logistics<\/li><li>Introduction<\/li><li>Class Rules<\/li><li>The ISCAP Credential<\/li><li>What information will be covered?<\/li><li>Relationship to Other Processes<\/li><li>Changes in Terminology<\/li><li>Understanding the Risk Management Framework<\/li><li>NIST SP800-37 Rev1<\/li><li>Emphasis of SP800-37<\/li><li>Multi-tiered Risk Management<\/li><li>The Risk Management Framework What information will be covered?<\/li><li>Summary<\/li><\/ul><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3841\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3841\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 1: Introduction to the RMF  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3841\" class=\"elementor-element elementor-element-2a937b8 e-con-full e-flex e-con e-child\" data-id=\"2a937b8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3841\" class=\"elementor-element elementor-element-41d477c e-flex e-con-boxed e-con e-child\" data-id=\"41d477c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-117f736 elementor-widget elementor-widget-text-editor\" data-id=\"117f736\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<\/p><ul><li>What's covered in this domain?<\/li><li>The RMF<\/li><li>The pillars of CIA<\/li><li>National Strategy on Cybersecurity<\/li><li>Cyber Attacks<\/li><li>Federal Policy<\/li><li>Actions of Executive Agencies<\/li><li>Federal Policies<\/li><li>E-Government Act of 2002<\/li><li>FISMA<\/li><li>Applying NIST<\/li><li>Special Publications 800-39<\/li><li>Purpose NIST SP 800-39<\/li><li>Information Systems<\/li><li>What is Risk?<\/li><li>Types of Risk<\/li><li>Security Risk<\/li><li>Information Security Risk<\/li><li>Core Documents<\/li><li>Risk Management<\/li><li>Risk Management Process<\/li><li>IS Risk Management<\/li><li>Threats<\/li><li>Objectives of the RMF<\/li><li>Effective Risk Management<\/li><li>Risk Tolerance \/ Acceptance<\/li><li>Risk Assessment<\/li><li>Risk Response<\/li><li>Risk Monitoring<\/li><li>Risk Management Process<\/li><li>Frame Risk<\/li><li>Multi-tiered Risk Management<\/li><li>Key Parts of Tier 1<\/li><li>Tier 2 Activities<\/li><li>Key Parts of Tier 2<\/li><li>IS Requirements Integration<\/li><li>Tier 3<\/li><li>Developing Trust<\/li><li>Trustworthiness<\/li><li>Frame Risk<\/li><li>Frame Risk Activities<\/li><li>Risk Assessment<\/li><li>Assess Risk Activities<\/li><li>Threat<\/li><li>Vulnerability<\/li><li>Likelihood<\/li><li>Adversarial Likelihood<\/li><li>Impact<\/li><li>Aggregation<\/li><li>Quantitative Risk<\/li><li>Qualitative Risk<\/li><li>Semi-quantitative<\/li><li>Risk Assessment Process<\/li><li>Step 1 - Preparing for the Assessment<\/li><li>Conducting the Risk Assessment<\/li><li>Conducting the Risk Assessment<\/li><li>Communicating and Sharing Risk Assessment Information<\/li><li>Maintaining the Risk Assessment<\/li><li>Risk Management Process<\/li><li>Risk Responses<\/li><li>Risk Response Strategy<\/li><li>Risk Management Process<\/li><li>Monitoring Risk<\/li><li>Risk Monitoring Activities<\/li><li>Moving to the RMF<\/li><li>The RMF<\/li><li>Security Control Assessment<\/li><li>Applying the RMF<\/li><li>Applying the RMF cont.<\/li><li>The RMF Process<\/li><li>Summary<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3842\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3842\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 2: The Software Development Life Cycle <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3842\" class=\"elementor-element elementor-element-89d08ad e-con-full e-flex e-con e-child\" data-id=\"89d08ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3842\" class=\"elementor-element elementor-element-9e03bb6 e-flex e-con-boxed e-con e-child\" data-id=\"9e03bb6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ef78f3 elementor-widget elementor-widget-text-editor\" data-id=\"3ef78f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<\/p><ul><li>The RMF Process<\/li><li>Purpose of SP800-37<\/li><li>Definitions<\/li><li>Guidelines for Implementing SP800-37<\/li><li>Relationship with other SPs<\/li><li>Tiered Risk Management Approach<\/li><li>Steps of the RMF<\/li><li>Effective Controls<\/li><li>The SDLC<\/li><li>Balancing all Considerations<\/li><li>The Phases of the SDLC Security Requirements<\/li><li>Benefits of Early Integration<\/li><li>Integration<\/li><li>Integrated Project Teams<\/li><li>Role of ISSOs<\/li><li>Reuse of Information<\/li><li>Benefits of Reuse<\/li><li>Identifying Boundaries<\/li><li>Well-defined Boundaries<\/li><li>Correct Boundary Size<\/li><li>Size of Information System Boundaries<\/li><li>Key Words in Boundary Determination<\/li><li>Software Applications<\/li><li>Boundaries for Complex Systems<\/li><li>Complex System<\/li><li>Boundaries What is Security?<\/li><li>Allocation of Controls to Subsystems<\/li><li>Types of Controls<\/li><li>Architecture and Controls<\/li><li>Common Controls<\/li><li>Control Selection<\/li><li>Security Control Allocation<\/li><li>Summary<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3843\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3843\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 3: RMF Step 1 <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3843\" class=\"elementor-element elementor-element-2476231 e-flex e-con-boxed e-con e-child\" data-id=\"2476231\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3843\" class=\"elementor-element elementor-element-f285239 e-con-full e-flex e-con e-child\" data-id=\"f285239\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6144ff1 elementor-widget elementor-widget-text-editor\" data-id=\"6144ff1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<\/p><ul><li>The RMF Tasks<\/li><li>RMF Tasks<\/li><li>Milestones<\/li><li>Sequence<\/li><li>The Last Step<\/li><li>Legacy Systems Level of Effort Required<\/li><li>The RMF Process<\/li><li>Security Categorization<\/li><li>Categorization<\/li><li>Map Impact Levels<\/li><li>Influence of Architecture<\/li><li>Accuracy of Categorization<\/li><li>Impact-based Categorization<\/li><li>Categorization Levels<\/li><li>Format of Categorization<\/li><li>Categorization<\/li><li>Appropriate Controls<\/li><li>SSP<\/li><li>Information System Description<\/li><li>Information System Registration<\/li><li>System Registration<\/li><li>Milestone Checkpoint # 1<\/li><li>Summary<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3844\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3844\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 4: RMF Step 2 <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3844\" class=\"elementor-element elementor-element-5774738 e-flex e-con-boxed e-con e-child\" data-id=\"5774738\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3844\" class=\"elementor-element elementor-element-9df7eaa e-con-full e-flex e-con e-child\" data-id=\"9df7eaa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bebf37a elementor-widget elementor-widget-text-editor\" data-id=\"bebf37a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<\/p><ul><li>Common Control Identification<\/li><li>Common Controls<\/li><li>Supplementing Common Controls I<\/li><li>Inheriting Controls<\/li><li>Common Control Providers<\/li><li>Documentation of Common Controls<\/li><li>Security Control Selection<\/li><li>Selection of Controls<\/li><li>Control Selection<\/li><li>Preparing for Monitoring<\/li><li>Monitoring Strategy<\/li><li>Control Monitoring<\/li><li>Effective Monitoring<\/li><li>Continuous Monitoring<\/li><li>Security Plan Approval<\/li><li>Milestone Checkpoint # 2<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3845\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3845\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 5: RMF Step 3 <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3845\" class=\"elementor-element elementor-element-9d3eda2 e-flex e-con-boxed e-con e-child\" data-id=\"9d3eda2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3845\" class=\"elementor-element elementor-element-4b82880 e-con-full e-flex e-con e-child\" data-id=\"4b82880\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f8d212 elementor-widget elementor-widget-text-editor\" data-id=\"2f8d212\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<\/p><ul><li>The RMF Process<\/li><li>Security Control Implementation<\/li><li>Security Controls<\/li><li>Security Control Assurance<\/li><li>Common Controls<\/li><li>Assessments<\/li><li>Security Control Documentation<\/li><li>Documentation<\/li><li>Functional Description<\/li><li>Milestone Checkpoint #3<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3846\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3846\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 6: RMF Step 4  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3846\" class=\"elementor-element elementor-element-4792572 e-flex e-con-boxed e-con e-child\" data-id=\"4792572\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3846\" class=\"elementor-element elementor-element-8344593 e-con-full e-flex e-con e-child\" data-id=\"8344593\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-038b236 elementor-widget elementor-widget-text-editor\" data-id=\"038b236\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<\/p><ul><li>The RMF Process<\/li><li>Assessment Preparation<\/li><li>The Assessment Plan<\/li><li>Purpose of the Plan<\/li><li>Type of Assessment<\/li><li>Approval of the Plan<\/li><li>External Providers<\/li><li>Assessor Competence<\/li><li>Assessor Independence<\/li><li>Security Control Assessment<\/li><li>Control Assessments<\/li><li>Timing of Assessments<\/li><li>Assess and Recommend Findings<\/li><li>Incremental Assessments<\/li><li>Access<\/li><li>Security Assessment Report<\/li><li>Assessment Report<\/li><li>Determination of Risk<\/li><li>Assessment Results<\/li><li>Remediation Actions<\/li><li>Report Findings<\/li><li>Response to Findings<\/li><li>Reassessment<\/li><li>Updating the Security Plan<\/li><li>The Updated Plan<\/li><li>Optional Addendum<\/li><li>Milestone #4<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3847\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"8\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3847\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 7: RMF Step 5  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3847\" class=\"elementor-element elementor-element-da016bb e-flex e-con-boxed e-con e-child\" data-id=\"da016bb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3847\" class=\"elementor-element elementor-element-092ef4c e-con-full e-flex e-con e-child\" data-id=\"092ef4c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0ff719b elementor-widget elementor-widget-text-editor\" data-id=\"0ff719b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<\/p><ul><li>The RMF Process<\/li><li>Plan of Action and Milestones<\/li><li>PoA&amp;M<\/li><li>Milestones<\/li><li>Monitoring the PoA&amp;M<\/li><li>Documenting Weaknesses<\/li><li>PoA&amp;M Not Required<\/li><li>Security Authorization Package<\/li><li>Common Controls<\/li><li>Updating the SSP<\/li><li>Risk Determination<\/li><li>Assess Current Security State<\/li><li>Risk Management Strategy<\/li><li>Risk Acceptance<\/li><li>Explicit Acceptance of Risk<\/li><li>Risk Decision<\/li><li>The Authorization Decision<\/li><li>Communicating the Decision<\/li><li>Authorization to Operate<\/li><li>Termination Date<\/li><li>Interim Authorization to Test<\/li><li>Interim Authorization to Operate<\/li><li>Type Authorization<\/li><li>Examples of Type Authorizations<\/li><li>Authorization Approaches<\/li><li>Authorization Rescission<\/li><li>Denial of Authorization<\/li><li>Authorization Decision<\/li><li>Document The Decision<\/li><li>Termination Date<\/li><li>Decision Document<\/li><li>Change in Authorizing Official<\/li><li>Acceptance of Previous Authorization<\/li><li>Milestone Checkpoint #5<\/li><li>The RMF Process<\/li><li>Information System and Environment Changes<\/li><li>Constant Change<\/li><li>Controlling Change<\/li><li>Record Changes<\/li><li>Impact on Security<\/li><li>Impact on Controls<\/li><li>Documenting Impact<\/li><li>Reauthorization<\/li><li>Ongoing Security Control Assessments<\/li><li>Ongoing Monitoring<\/li><li>Continuous Monitoring<\/li><li>Control Monitoring<\/li><li>Ongoing Remediation Actions<\/li><li>Updated Assessments Remediation Actions<\/li><li>Reassessing Controls<\/li><li>Key Updates<\/li><li>Updating the SSP<\/li><li>Updating the PoA&amp;M<\/li><li>Supporting Continuous Monitoring<\/li><li>Security Status Reporting<\/li><li>Reporting to the Authorizing Official<\/li><li>Security Status Reports<\/li><li>Frequency of Reporting<\/li><li>Reauthorization<\/li><li>Ongoing Risk Determination and Acceptance<\/li><li>Reviewing Reports<\/li><li>Metrics and Dashboards<\/li><li>Maintaining Security<\/li><li>Information System Removal and Decommissioning<\/li><li>Disposal Milestone<\/li><li>Checkpoint #6\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3add2827 e-flex e-con-boxed e-con e-child\" data-id=\"3add2827\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-796b392b e-flex e-con-boxed e-con e-child\" data-id=\"796b392b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39dfad0 elementor-widget elementor-widget-heading\" data-id=\"39dfad0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Goal<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a33cab7 elementor-widget elementor-widget-text-editor\" data-id=\"2a33cab7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the exam.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f051be3 e-flex e-con-boxed e-con e-child\" data-id=\"4f051be3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52b552e6 elementor-widget elementor-widget-heading\" data-id=\"52b552e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Prerequisites<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cfa19f0 elementor-widget elementor-widget-text-editor\" data-id=\"2cfa19f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>(Any one of the following) This is an advanced look into how the RMF applies to government systems.<\/li><li>4-5 years of information systems security management is suggested (or equivalent education).<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b52a59 e-flex e-con-boxed e-con e-parent\" data-id=\"5b52a59\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-158a494 elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"158a494\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/CRMFA-Web-Outline.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">See the brochure for this course<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-38e6e80 e-flex e-con-boxed e-con e-parent\" data-id=\"38e6e80\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Target group IS Security Owners Security Officers Ethical Hackers Information Owners Penetration Testers System Owners and Managers Cyber Security Engineers Description Mile2\u2019s Risk Management Framework Analyst training quantifies the process of certifying, reviewing, and accrediting an information system by IT professionals. This course was created as a standard to measure the set of skills that [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":11359,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"accesibilite":[145],"certification":[87],"duree":[152],"examen":[146],"langue":[164],"niveau":[105],"formateur":[103],"mec_category":[124],"class_list":["post-11465","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","accesibilite-oui","certification-oui","duree-3-jours","examen-oui","langue-anglais","niveau-level-400","formateur-mile2","mec_category-management-roles-dod-cybersecurity-manager"],"acf":{"taux_davis_etoile":4.7,"taux_de_reussite":4.9,"formation_populaire":false,"lien_guide_dexamen":"","liste_importance_formations":8},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>C)RMFA: Certified Risk Manager Framework Analyst\u00a0 - ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"Mile2\u2019s Risk Management Framework Analyst training quantifies the process of certifying, reviewing, and accrediting an information system by IT professionals.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/events\/crmfa-certified-risk-manager-framework-analyst\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"C)RMFA: Certified Risk Manager Framework Analyst\u00a0 - ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"Mile2\u2019s Risk Management Framework Analyst training quantifies the process of certifying, reviewing, and accrediting an information system by IT professionals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/events\/crmfa-certified-risk-manager-framework-analyst\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-25T14:11:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/CRMFA-badgeAsset-67.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"304\" \/>\n\t<meta property=\"og:image:height\" content=\"243\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/crmfa-certified-risk-manager-framework-analyst\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/crmfa-certified-risk-manager-framework-analyst\\\/\",\"name\":\"C)RMFA: Certified Risk Manager Framework Analyst\u00a0 - ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/crmfa-certified-risk-manager-framework-analyst\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/crmfa-certified-risk-manager-framework-analyst\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/CRMFA-badgeAsset-67.webp\",\"datePublished\":\"2024-07-10T10:11:30+00:00\",\"dateModified\":\"2025-11-25T14:11:23+00:00\",\"description\":\"Mile2\u2019s Risk Management Framework Analyst training quantifies the process of certifying, reviewing, and accrediting an information system by IT professionals.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/crmfa-certified-risk-manager-framework-analyst\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/crmfa-certified-risk-manager-framework-analyst\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/crmfa-certified-risk-manager-framework-analyst\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/CRMFA-badgeAsset-67.webp\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/CRMFA-badgeAsset-67.webp\",\"width\":304,\"height\":243,\"caption\":\"Mile2\u2019s Risk Management Framework Analyst training quantifies the process of certifying, reviewing, and accrediting an information system by IT professionals.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/crmfa-certified-risk-manager-framework-analyst\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"C)RMFA: Certified Risk Manager Framework Analyst\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C)RMFA: Certified Risk Manager Framework Analyst\u00a0 - ACG CyberAcademy","description":"Mile2\u2019s Risk Management Framework Analyst training quantifies the process of certifying, reviewing, and accrediting an information system by IT professionals.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/events\/crmfa-certified-risk-manager-framework-analyst\/","og_locale":"en_GB","og_type":"article","og_title":"C)RMFA: Certified Risk Manager Framework Analyst\u00a0 - ACG CyberAcademy","og_description":"Mile2\u2019s Risk Management Framework Analyst training quantifies the process of certifying, reviewing, and accrediting an information system by IT professionals.","og_url":"https:\/\/acgcyberacademy.fr\/en\/events\/crmfa-certified-risk-manager-framework-analyst\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2025-11-25T14:11:23+00:00","og_image":[{"width":304,"height":243,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/CRMFA-badgeAsset-67.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/events\/crmfa-certified-risk-manager-framework-analyst\/","url":"https:\/\/acgcyberacademy.fr\/events\/crmfa-certified-risk-manager-framework-analyst\/","name":"C)RMFA: Certified Risk Manager Framework Analyst\u00a0 - ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/events\/crmfa-certified-risk-manager-framework-analyst\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/events\/crmfa-certified-risk-manager-framework-analyst\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/CRMFA-badgeAsset-67.webp","datePublished":"2024-07-10T10:11:30+00:00","dateModified":"2025-11-25T14:11:23+00:00","description":"Mile2\u2019s Risk Management Framework Analyst training quantifies the process of certifying, reviewing, and accrediting an information system by IT professionals.","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/events\/crmfa-certified-risk-manager-framework-analyst\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/events\/crmfa-certified-risk-manager-framework-analyst\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/events\/crmfa-certified-risk-manager-framework-analyst\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/CRMFA-badgeAsset-67.webp","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/CRMFA-badgeAsset-67.webp","width":304,"height":243,"caption":"Mile2\u2019s Risk Management Framework Analyst training quantifies the process of certifying, reviewing, and accrediting an information system by IT professionals."},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/events\/crmfa-certified-risk-manager-framework-analyst\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/acgcyberacademy.fr\/events\/"},{"@type":"ListItem","position":3,"name":"C)RMFA: Certified Risk Manager Framework Analyst\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/11465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=11465"}],"version-history":[{"count":4,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/11465\/revisions"}],"predecessor-version":[{"id":21964,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/11465\/revisions\/21964"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/11359"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=11465"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/tags?post=11465"},{"taxonomy":"accesibilite","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/accesibilite?post=11465"},{"taxonomy":"certification","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/certification?post=11465"},{"taxonomy":"duree","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/duree?post=11465"},{"taxonomy":"examen","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/examen?post=11465"},{"taxonomy":"langue","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/langue?post=11465"},{"taxonomy":"niveau","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/niveau?post=11465"},{"taxonomy":"formateur","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/formateur?post=11465"},{"taxonomy":"mec_category","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec_category?post=11465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}