Home
:
Book details
:
Book description
Description of
Cybersecurity Maturity Model Certification (CMMC)
Published 1/2023 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Language: English | Duration: 37m | Size: 454 MB This program is designed to provide you with essential insights into comprehending the CMMC What you'll learn Fundamentals of CMMC Structure of the CMMC Model CMMC Controls CMMC Certification Process CMMC Assessment Process Key U.S. Government Regulations Defense Federal Acquisition Regulations NIST Special Publication 800-171 series Requirements U.S. Government Cybersecurity Requirements NIST Risk Management Framework Description In recent years, there have been numerous detrimental breaches of both classified and unclassified government data, leading to the unauthorized exposure of sensitive information. To safeguard this data, the Federal government has implemented measures, enforcing legal and contractual obligations on defense contractors through the Cybersecurity Maturity Model Certification (CMMC). This course is specifically crafted for security professionals seeking an introductory understanding of the recently imposed CMMC requirements by the U.S. Government on its supply and service providers. Within the Cybersecurity Maturity Model Certification (CMMC) course, you will dive into the fundamentals of CMMC, exploring its origins and significance. Initially, you'll examine key U.S. Government regulations, such as the Defense Federal Acquisition Regulations, that necessitate the application of CMMC to Department of Defense contractors. Subsequently, you'll explore the NIST Special Publication 800-171 series. The course then provides insight into the structure of the CMMC model, encompassing its levels, controls, and practices. Lastly, you'll gain a comprehensive understanding of the challenges and processes involved in achieving all three levels of the CMMC Maturity Model. Upon completing this course, you will have a comprehensive understanding of how the CMMC relates to various scenarios encountered by defense contractors, enriching your expertise in this critical area. Who this course is for Security Professionals