Cybersecurity Maturity Model Certification (CMMC) - Part VI

OBJECTIVES

  • Understand the CMMC Model and controls
  • Interpret the NIST SP800-171 Controls and apply the control guidance in gap analysis, remediation and implementing controls
  • Understand the specific domains:
  • Personnel Security -Screen personnel, Protect CUI during personnel actions
  • Physical Protection - Limit physical access
  • Risk Management -Identify and evaluate risk, manage risk, Manage supply chain risk
  • Security Assessment -Develop and manage a system security plan, Define and manage controls, Perform code reviews
  • System &Communications Protection - Define security requirements for systems and communications, Control communication at system boundaries
  • System &Information Integrity - Identify and manage information system flaws, identify malicious content, perform network and system monitoring, Implement advanced email protections

Enjoy our sample video!


WHO THE COURSE IS FOR?

This course is designed for organizations that will seek Cybersecurity Maturity Model Certification (CMMC). It examines maturity cybersecurity practices, their potential impact on your organization and the resources needed to successfully implement, as well as a brief walkthrough of the assessment process.


COURSE CONTENTS

The Defense Industrial Base (DIB) sector consists of companies that contribute to research, engineering, production, delivery, operations, installation, and support services. The cyber actors continue to target the DIB sector and the Department of Defense (DoD) supply chain for intellectual property and unclassified information. The DoD has released the Cybersecurity Maturity Model Certification (CMMC) to ensure appropriate levels of cybersecurity controls, and processes are adequate and in place to protect Controlled Unclassified Information (CUI) on DoD contractor systems.
 
The course starts with the details about the CMMC model structure (domains, capabilities, practices, and processes), how the model works, five process maturity levels, and five technical practices. The course includes deep dive to learn about the Personnel Security, Physical Protection, Risk Management, Security Assessment, System & Communications Protection and System& Information Integrity controls.
 
This interactive training course will ensure professionals and practitioners at all levels understand their roles and responsibilities, new developments, resources, and hallmarks of an effective compliance program. In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning, followed by the end of the course final assessment.