We may earn an affiliate commission when you visit our partners.
Course image
Dave Hatter

NIST SP 800-171 is a cybersecurity framework of 110 controls in 14 families published by the National Institute of Standards and Technology (NIST). This learning path will teach you how to comply with the requirements of NIST 800-171. You will understand what CUI is and how to identify it; what a nonfederal information systems is; how to understand each of the 110 requirements in the framework and satisfy each of them if necessary; how to create a Body of Evidence (BOE) including Organizational Policy or Procedures; a System Security Plan (SSP) and Plans of Action and Milestones (POAM). Upon completion of this course, you will have the knowledge and skills to implement the controls required by the NIST 800-171 framework and build your BOE.

Enroll now

What's inside

Syllabus

Review the DFARS Requirement that led to NIST 800-171
Understanding the NIST 800-171 Controls
Understand and Create Policies and Plans
Read more
Create and SSP for Implemented Controls
Create a POAM for Unimplemented Controls
Review how NIST 800-171 compliance prepares an org for CMMC Levels 1-3
Putting it all together

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches learners how to comply with the NIST 800-171 framework, which is imperative for cybersecurity
Taught by Dave Hatter, who is experienced in this field
Builds a strong knowledge base for beginners in cybersecurity

Save this course

Save NIST 800-171 to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in NIST 800-171 with these activities:
NIST 800-171 Controls Overview
Refresh your knowledge of the NIST 800-171 controls by reviewing the course syllabus, module overviews, or any background materials provided by NIST.
Show steps
  • Review the course syllabus
  • Review course materials
Review of DFARS Requirements
Review the DFARS requirement that led to NIST 800-171 to strengthen your foundational knowledge and better understand the context of the framework.
Show steps
  • Read and understand the DFARS requirement
  • Identify the key requirements and objectives of DFARS
  • Research the history and evolution of DFARS
NIST 800-171 Implementation Tutorial
Enhance your understanding of NIST 800-171 implementation by following guided tutorials that provide step-by-step instructions and demonstrations.
Show steps
  • Identify a specific control to implement
  • Locate a relevant tutorial or guide
  • Follow the tutorial instructions
  • Test the implementation
12 other activities
Expand to see all activities and additional details
Show all 15 activities
NIST 800-171 Controls Overview
Seek out and follow tutorials to gain a comprehensive understanding of the NIST 800-171 controls and their implementation.
Show steps
  • Identify reputable sources for tutorials on NIST 800-171 controls
  • Follow tutorials to understand the purpose and requirements of each control
  • Take notes and document your learning
NIST 800-171 Control Assessment Quizzes
Reinforce your understanding of NIST 800-171 controls by completing practice quizzes that test your knowledge of each control's requirements and implementation.
Show steps
  • Identify the control to be assessed
  • Take a practice quiz or assessment
  • Review the results
NIST 800-171 Compliance Conference
Engage in discussions with industry experts and practitioners at a NIST 800-171 compliance conference to gain insights and learn from their experiences.
Show steps
  • Research and identify a relevant conference
  • Register and attend the conference
  • Participate in sessions and discussions
  • Network with other attendees
NIST 800-171 Study Group
Engage with peers to discuss and share knowledge about NIST 800-171, fostering a collaborative learning environment.
Show steps
  • Find or create a study group with other learners of NIST 800-171
  • Set regular meeting times and establish a study schedule
  • Take turns leading discussions and presenting on different topics related to NIST 800-171
NIST 800-171 Compliance Support
Apply your knowledge by volunteering to assist organizations in implementing and maintaining NIST 800-171 compliance, providing hands-on experience and networking opportunities.
Show steps
  • Identify organizations seeking NIST 800-171 compliance support
  • Contact the organizations and offer your assistance
  • Provide guidance and support to the organizations
NIST 800-171 Compliance Report
Consolidate your knowledge by creating a comprehensive NIST 800-171 compliance report that demonstrates your understanding of the controls, their implementation, and your organization's compliance status.
Show steps
  • Gather evidence of compliance
  • Analyze the evidence
  • Write the report
  • Review and submit the report
Control Implementation Exercises
Engage in practice drills to reinforce your understanding of control implementation and gain hands-on experience.
Show steps
  • Identify scenarios where NIST 800-171 controls can be applied
  • Develop a plan for implementing the controls in a simulated environment
  • Test and evaluate the effectiveness of your implementation
NIST 800-171 Resources Compilation
Gather and organize materials related to NIST 800-171 to create a comprehensive resource for future reference and continued learning.
Show steps
  • Identify and collect relevant documents, articles, and resources on NIST 800-171
  • Organize and categorize the materials for easy access
  • Create a reference guide or index for the compiled materials
NIST 800-171 Compliance Toolkit
Enhance your practical skills by developing a NIST 800-171 compliance toolkit that includes templates, checklists, and guidance to assist organizations in achieving compliance.
Show steps
  • Research and gather resources
  • Create templates and checklists
  • Develop guidance and documentation
  • Test and refine the toolkit
NIST 800-171 Policy and Plan Development
Create a mock organizational policy or procedure and system security plan (SSP) to demonstrate your understanding of the requirements and demonstrate your ability to apply them practically.
Browse courses on Policy Development
Show steps
  • Review and understand the NIST 800-171 requirements for policies and plans
  • Draft an organizational policy or procedure that aligns with the NIST 800-171 controls
  • Develop a system security plan (SSP) that addresses the technical implementation of the controls
NIST 800-171 Implementation Plan
Develop an implementation plan to demonstrate your understanding of the NIST 800-171 controls and your ability to apply them to a real-world scenario.
Show steps
  • Define the scope and objectives of the implementation plan
  • Identify the resources and timeline required for implementation
  • Develop a detailed plan outlining the steps and milestones for implementation
  • Include a risk assessment and mitigation strategy
NIST 800-171 Certification Preparation Workshop
Attend a workshop designed to prepare you for the NIST 800-171 certification exam, providing focused guidance and practice.
Browse courses on Certification Preparation
Show steps
  • Research and identify reputable NIST 800-171 certification preparation workshops
  • Register for a workshop that aligns with your learning style and schedule
  • Actively participate in the workshop, taking notes and asking questions

Career center

Learners who complete NIST 800-171 will develop knowledge and skills that may be useful to these careers:
Information Security Manager
Information Security Managers are responsible for developing and implementing an organization's information security program. This course can help you to prepare for a career as an Information Security Manager by providing you with a comprehensive understanding of the NIST 800-171 cybersecurity framework. This framework is used by many organizations to protect their sensitive data, and by completing this course, you will gain the skills and knowledge you need to develop and implement a robust information security program for your own organization.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's computer networks and systems from cyberattacks. This course can help you to prepare for a career as an Information Security Analyst by providing you with a deep understanding of the NIST 800-171 cybersecurity framework. This framework is used by many organizations to protect their sensitive data, and by completing this course, you will gain the skills and knowledge you need to implement and maintain NIST 800-171 controls in your own organization.
Security Consultant
Security Consultants help organizations to identify and mitigate cybersecurity risks. This course can help you to prepare for a career as a Security Consultant by providing you with a comprehensive understanding of the NIST 800-171 cybersecurity framework. This framework is used by many organizations to protect their sensitive data, and by completing this course, you will gain the skills and knowledge you need to help organizations to identify and mitigate cybersecurity risks.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain an organization's cybersecurity systems. This course can help you to prepare for a career as a Cybersecurity Engineer by providing you with a deep understanding of the NIST 800-171 cybersecurity framework. This framework is used by many organizations to protect their sensitive data, and by completing this course, you will gain the skills and knowledge you need to design, implement, and maintain secure cybersecurity systems for your own organization.
Network Security Engineer
Network Security Engineers design, implement, and maintain an organization's network security systems. This course can help you to prepare for a career as a Network Security Engineer by providing you with a deep understanding of the NIST 800-171 cybersecurity framework. This framework is used by many organizations to protect their sensitive data, and by completing this course, you will gain the skills and knowledge you need to design, implement, and maintain secure network security systems for your own organization.
IT Auditor
IT Auditors assess an organization's IT systems and controls to ensure that they are compliant with regulations and standards. This course can help you to prepare for a career as an IT Auditor by providing you with a deep understanding of the NIST 800-171 cybersecurity framework. This framework is used by many organizations to protect their sensitive data, and by completing this course, you will gain the skills and knowledge you need to assess an organization's IT systems and controls for compliance with NIST 800-171.
Security Architect
Security Architects design, implement, and maintain an organization's overall security architecture. This course can help you to prepare for a career as a Security Architect by providing you with a comprehensive understanding of the NIST 800-171 cybersecurity framework. This framework is used by many organizations to protect their sensitive data, and by completing this course, you will gain the skills and knowledge you need to design, implement, and maintain a robust security architecture for your own organization.
Cloud Security Engineer
Cloud Security Engineers design, implement, and maintain an organization's cloud security systems. This course can help you to prepare for a career as a Cloud Security Engineer by providing you with a deep understanding of the NIST 800-171 cybersecurity framework. This framework is used by many organizations to protect their sensitive data, and by completing this course, you will gain the skills and knowledge you need to design, implement, and maintain secure cloud security systems for your own organization.
SOC Analyst
SOC Analysts monitor and respond to security events in an organization's IT systems. This course can be useful for those who are interested in a career as a SOC Analyst, as it provides a foundation in the NIST 800-171 cybersecurity framework. This framework is used by many organizations to protect their sensitive data, and by completing this course, you will gain the skills and knowledge you need to monitor and respond to security events effectively.
Risk Analyst
Risk Analysts assess the risks to an organization's IT systems and data. This course can be useful for those who are interested in a career as a Risk Analyst, as it provides a foundation in the NIST 800-171 cybersecurity framework. This framework is used by many organizations to protect their sensitive data, and by completing this course, you will gain the skills and knowledge you need to assess the risks to an organization's IT systems and data effectively.
Incident Responder
Incident Responders are responsible for responding to and mitigating cybersecurity incidents. This course can be useful for those who are interested in a career as an Incident Responder, as it provides a foundation in the NIST 800-171 cybersecurity framework. This framework is used by many organizations to protect their sensitive data, and by completing this course, you will gain the skills and knowledge you need to respond to and mitigate cybersecurity incidents effectively.
Penetration Tester
Penetration Testers assess the security of an organization's computer systems by simulating cyberattacks. This course can be useful for those who are interested in a career as a Penetration Tester, as it provides a foundation in the NIST 800-171 cybersecurity framework. This framework is used by many organizations to protect their sensitive data, and by completing this course, you will gain the skills and knowledge you need to assess the security of an organization's computer systems effectively.
Threat Intelligence Analyst
Threat Intelligence Analysts collect and analyze information about cyber threats. This course can be useful for those who are interested in a career as a Threat Intelligence Analyst, as it provides a foundation in the NIST 800-171 cybersecurity framework. This framework is used by many organizations to protect their sensitive data, and by completing this course, you will gain the skills and knowledge you need to collect and analyze information about cyber threats effectively.
Forensic Analyst
Forensic Analysts investigate computer crimes. This course can be useful for those who are interested in a career as a Forensic Analyst, as it provides a foundation in the NIST 800-171 cybersecurity framework. This framework is used by many organizations to protect their sensitive data, and by completing this course, you will gain the skills and knowledge you need to investigate computer crimes effectively.
Data Analyst
Data Analysts analyze data to identify trends and patterns. This course can be useful for those who are interested in a career as a Data Analyst, as it provides a foundation in the NIST 800-171 cybersecurity framework. This framework is used by many organizations to protect their sensitive data, and by completing this course, you will gain the skills and knowledge you need to help organizations to identify and mitigate data security risks.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in NIST 800-171.
This is the official publication of the NIST 800-171 framework. It provides a comprehensive overview of the framework's requirements and how to implement them.
Is the official NIST publication of SP 800-53 Rev. 5 and provides the full text of the standard. It valuable reference for anyone who needs to understand the requirements of NIST 800-53.
Comprehensive study guide for the CISSP certification exam. While not specific to NIST 800-171, it provides valuable background information on many of the cybersecurity concepts and practices covered by the framework.
Provides a practical overview of computer security. It good resource for anyone who wants to learn more about the basics of computer security or who wants to prepare for the CISSP certification exam.
Provides a comprehensive overview of cryptography and network security. It good resource for anyone who wants to learn more about the basics of cryptography and network security or who wants to prepare for the CISSP certification exam.
Provides a comprehensive overview of ethical hacking and penetration testing. It good resource for anyone who wants to learn more about the basics of ethical hacking or who wants to prepare for the CEH certification exam.
Provides a comprehensive overview of computer security. It good resource for anyone who wants to learn more about the basics of computer security or who wants to prepare for the CISSP certification exam.
Provides guidance on how to implement a risk management framework for federal information systems. It valuable resource for anyone who is responsible for the security of federal information systems.
Provides guidance on how to implement information security continuous monitoring for federal information systems. It valuable resource for anyone who is responsible for the security of federal information systems.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser