CMMC Organisational Foundations
Provided by QA
Overview
The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices, as well as their integration of corresponding policies and plans into their overall business operations. Once rule-making has concluded and CMMC 2.0 has been implemented, all organizations providing products or services to the United States Department of Defense (DoD) must comply with the requirements of their applicable CMMC Level. This course provides a complete review of the key elements of this important program.
Important: This curriculum product is not considered CMMC-AB Approved Training Material (CATM). Although it contains the same information covered in the CCP training materials, this course is not intended as certification preparation and does not qualify students to sit for the CMMC CP certification exam.
+
Prerequisites
No prequisites.
This course provides an immersive learning experience for business and technical professionals who need a thorough understanding of the CMMC program. It does this by taking the point of view of a CMMC Certified Professional. Students might consider taking this course to learn more about the overall CMMC program, how DoD contractors are assessed, and how to help their organizations prepare for a CMMC Assessment.
+
Delegates will learn how to
In this course, you will learn about the CMMC Model, framework, context, and application within the DoD, as well as the expectations and requirements imposed upon organizations that do business with the DoD.
You will:
Outline
Module 1: Managing Risk within the Defense Supply Chain
Appendix B: Additional Documentation for CCPs
+
The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices, as well as their integration of corresponding policies and plans into their overall business operations. Once rule-making has concluded and CMMC 2.0 has been implemented, all organizations providing products or services to the United States Department of Defense (DoD) must comply with the requirements of their applicable CMMC Level. This course provides a complete review of the key elements of this important program.
Important: This curriculum product is not considered CMMC-AB Approved Training Material (CATM). Although it contains the same information covered in the CCP training materials, this course is not intended as certification preparation and does not qualify students to sit for the CMMC CP certification exam.
+
Prerequisites
No prequisites.
This course provides an immersive learning experience for business and technical professionals who need a thorough understanding of the CMMC program. It does this by taking the point of view of a CMMC Certified Professional. Students might consider taking this course to learn more about the overall CMMC program, how DoD contractors are assessed, and how to help their organizations prepare for a CMMC Assessment.
+
Delegates will learn how to
In this course, you will learn about the CMMC Model, framework, context, and application within the DoD, as well as the expectations and requirements imposed upon organizations that do business with the DoD.
You will:
- Identify the threats to the Defense Supply Chain and the established regulations and standards for managing the risk.
- Identify the sensitive information that needs to be protected within the Defense Supply Chain and how to manage it.
- Describe how the CMMC Model ensures compliance with federal acquisitions regulations.
- Identify responsibilities of the Certified CMMC Professional, including appropriate ethical behavior.
- Establish the Certification and Assessment scope boundaries for evaluating the systems that protect regulated information.
- Prepare the OSC for an Assessment by evaluating readiness.
- Use the CMMC Assessment Guides to determine and assess the Evidence for practices.
- Implement and evaluate practices required to meet CMMC Level 1.
- Identify the practices required to meet CMMC Level 2.
- Work through the CMMC Assessment process.
Outline
Module 1: Managing Risk within the Defense Supply Chain
- Identify Threats to the Defense Supply Chain
- Identify Regulatory Responses against Threats
- Identify Sensitive Information
- Manage the Sensitive Information
- Describe the CMMC Model Architecture
- Define the CMMC Program and Its Ecosystem
- Define Self-Assessments
- Identify Responsibilities of the CCP
- Demonstrate Appropriate Ethics and Behavior
- Use the CMMC Assessment Scope Documentation
- Get Oriented to the OSC Environment
- Determine How Sensitive Information Moves
- Identify Systems in Scope
- Limit Scope
- Foster a Mature Cybersecurity Culture
- Evaluate Readiness
- Determine Evidence
- Assess the Practices Using the CMMC Assessment Guides
- Identify CMMC Level 1 Domains and Practices
- Perform a CMMC Level 1 Gap Analysis
- Assess CMMC Level 1 Practices
- Identify CMMC Level 2 Practices
- Identify Assessment Roles and Responsibilities
- Plan and Prepare the Assessment
- Conduct the Assessment
- Report the Assessment Results
- Conduct the CMMC POA&M Close-Out Assessment
Appendix B: Additional Documentation for CCPs
+
Enquire
Start date | Location / delivery | |
---|---|---|
No fixed date | United Kingdom | Book now |
01132207150
01132207150