Cybersecurity Maturity Model Certification (CMMC) - Part IV

OBJECTIVES

You will learn:

  • The CMMC model and controls
  • Interpret the NIST SP 800-171 Controls and apply the control guidance in gap analysis, remediation and implementing controls
Access Control
  • Establish system access requirements
  • Control internal systems access
  • Control remote systems access
  • Limit data access to authorized users and processes
Awareness and Training
  • Conduct security awareness activities
  • Conduct training


Enjoy our sample video!


WHO THE COURSE IS FOR?

This course is designed for organizations that will seek Cybersecurity Maturity Model Certification (CMMC). It examines maturity cybersecurity practices, their potential impact on your organization and the resources needed to successfully implement, as well as a brief walkthrough of the assessment process.


COURSE CONTENTS

The Defense Industrial Base (DIB) sector consists of companies that contribute to research, engineering, production, delivery, operations, installation, and support services. The cyber actors continue to target the DIB sector and the Department of Defense (DoD) supply chain for intellectual property and unclassified information. The DoD has released the Cybersecurity Maturity Model Certification (CMMC) to ensure appropriate levels of cybersecurity controls, and processes are adequate and in place to protect Controlled Unclassified Information (CUI) on DoD contractor systems.

The course starts with the details about the CMMC model structure (domains, capabilities, practices, and processes), how the model works, five process maturity levels, and five technical practices. You will learn to interpret the NIST SP 800-171 controls and apply the control guidance in gap analysis and remediation. The course includes deep dive to learn about Access Control, Awareness, and Training.

This interactive training course will ensure professionals and practitioners at all levels understand their roles and responsibilities, new developments, resources, and hallmarks of an effective compliance program. In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning, followed by the end of the course final assessment.