Course Description
ISCM was developed by the US National Institute of Standards and Technology (NIST). NIST provides detailed guidance on implementing a risk management framework. It also provides a detailed and broad control set for federal agencies to adopt— though any organization can adopt the controls as standards. There are lessons to be learned and technology improvements that can be implemented in any industry, such as finance, utilities, health care, and more. A combination of the risk management framework, control set and the continuous monitoring implementation guidance can be used to set up acceptable continuous monitoring plan. In this course students explore new guidance, policy and procedures for implementing a well- developed and thorough strategy for building a continuous monitoring program IAW SP 800-137, 800-39, 800-55, 800-128, 800-37 (Rev. 2), and 800-53 (Rev. 5). Topics include roles and responsibilities, establishment and implementation of the ISCM strategy, analysis and reporting of findings, and program review in accordance with NIST Special Publication (SP) 800-137.
Information Security Continuous Monitoring (ISCM) Training Dec 2025Information Security Continuous Monitoring (ISCM) Training
Overview/Objectives
Key Terms
Why Continuous Monitoring?
Overview of Continuous Monitoring Process
Organization-wide view of ISCM
ISCM Roles and Responsibilities
Continuous Monitoring and Other NIST GuidanceNIST SP 800-39 – Risk Management ProcessNIST SP 800-55 – Defining Organizational Metrics and MeasurementsNIST SP 800-128 – Security Configuration Management for Information SystemsNIST SP 800-37, Rev. 1 – NIST Risk Management FrameworkNIST SP 800-53, Rev. 4 – Security Control Catalogue
NIST SP 800-39 – Risk Management Process
NIST SP 800-55 – Defining Organizational Metrics and Measurements
NIST SP 800-128 – Security Configuration Management for Information Systems
NIST SP 800-37, Rev. 1 – NIST Risk Management Framework
NIST SP 800-53, Rev. 4 – Security Control Catalogue
ISCM Process – NIST SP 800-137Step 1 – Define StrategyStep 2 – Establish ISCM programStep 3 – ImplementStep 4 – Analyze and ReportStep 5 – Respond to FindingsStep 6 – Review and Update
Step 1 – Define Strategy
Step 2 – Establish ISCM program
Step 3 – Implement
Step 4 – Analyze and Report
Step 5 – Respond to Findings
Step 6 – Review and Update
The Fundamentals – Ongoing Monitoring in Support of Risk ManagementOrganization-wide View of Continuous MonitoringOngoing System AuthorizationsRole of Automation in Continuous MonitoringTechnologies for Enabling ISCM
Organization-wide View of Continuous Monitoring
Ongoing System Authorizations
Role of Automation in Continuous Monitoring
Technologies for Enabling ISCM
Building a Continuous Monitoring ProgramDefine Continuous Monitoring StrategyEstablish an ISCM Program
Define Continuous Monitoring Strategy
Establish an ISCM Program
Implementing and Maintaining a Continuous Monitoring ProgramImplement a Continuous Monitoring ProgramAnalyze Data and Report FindingsRespond to FindingsReview and Update the Monitoring Program and Strategy
Implement a Continuous Monitoring Program
Analyze Data and Report Findings
Respond to Findings
Review and Update the Monitoring Program and Strategy
Supporting TechnologiesSecurity Automation DomainsSecurity Information and Event Management (SIEM)Security Content Automation Protocol (SCAP)Reference Data SourcesNational Vulnerability DatabaseSecurity Configuration Checklists
Security Automation Domains
Security Information and Event Management (SIEM)
Security Content Automation Protocol (SCAP)
Reference Data SourcesNational Vulnerability DatabaseSecurity Configuration Checklists
National Vulnerability Database
Security Configuration Checklists
ISCM Reference Model
Related Certificates
Earning a Saint Louis University Workforce Center certificate allows you to enhance your career options by networking with peers and establishing valuable industry contacts.
ISACA Professional Certificate
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Large Language Models Foundations
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Machine Learning for Cybersecurity Operations
Artificial intelligence (AI) and machine learning (ML) are revolutionizing the cybersecurity industry. The emergence of ML as a tool for...
See Details