Cybersecurity Maturity Model Certification (CMMC) - Part V

OBJECTIVES

  • Understand the CMMC Model and controls
  • Interpret the NIST SP 800-171Controls and apply the control guidance in gap analysis, remediation, and implementing controls
  • Understand the specific domains:
  • Audit & Accounting - Define audit requirements, perform auditing, Identify and protect audit information, Review and manage audit logs
  • Configuration Management -Establish configuration baselines, Perform configuration and change management
  • Identification and Authentication - Grant access to authenticated entities, Incident Response -Plan incident response, Detect and report events, Develop and implement a response to a declared incident, Perform post-incident reviews, Test incident response
  • Maintenance - Manage maintenance
  • Media Protection - Identify and mark media, Protect and control media, Sanitize media, Protect media during transport

Enjoy our sample video!


WHO THE COURSE IS FOR?

This course is designed for organizations that will seek Cybersecurity Maturity Model Certification (CMMC). It examines maturity cybersecurity practices, their potential impact on your organization and the resources needed to successfully implement, as well as a brief walkthrough of the assessment process.

COURSE CONTENTS

The Defense Industrial Base (DIB) sector consists of companies that contribute to research, engineering, production, delivery, operations, installation, and support services. The cyber actors continue to target the DIB sector and the Department of Defense (DoD) supply chain for intellectual property and unclassified information. The DoD has released the Cybersecurity Maturity Model Certification (CMMC) to ensure appropriate levels of cybersecurity controls, and processes are adequate and in place to protect Controlled Unclassified Information (CUI) on DoD contractor systems.

The course starts with the details about the CMMC model structure (domains, capabilities, practices, and processes), how the model works, five process maturity levels, and five technical practices. The course includes deep dive to learn about the Audit and Accounting Controls, Configuration Management controls, Identification &Authentication controls, Maintenance controls, and Media Protection Controls.

This interactive training course will ensure professionals and practitioners at all levels understand their roles and responsibilities, new developments, resources, and hallmarks of an effective compliance program. In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning, followed by the end of the course final assessment.