We may earn an affiliate commission when you visit our partners.
Bobby Rogers

The Department of Defense has imposed new requirements on contractors who process Controlled Unclassified Information. This course will give you the critical knowledge you need to understand the Cybersecurity Maturity Model Certification (CMMC).

Read more

The Department of Defense has imposed new requirements on contractors who process Controlled Unclassified Information. This course will give you the critical knowledge you need to understand the Cybersecurity Maturity Model Certification (CMMC).

Over the past several years, there have been many damaging breaches of both classified and unclassified government data. These breaches have resulted in the unauthorized disclosure of a wide range of sensitive information. The Federal government has now instituted measures to protect this data by imposing legal and contractual requirements on defense contractors, through a mechanism known as the Cybersecurity Maturity Model Certification (CMMC). This course is designed for security professionals requiring an initial exposure to the CMMC requirement recently levied by the U.S. Government on its supply and service providers. In this course, Security Compliance: CMMC, you will learn what the CMMC actually is, and why it was created. First, you’ll explore the key U.S. Government regulations involved with imposing the CMMC on Department of Defense contractors, including the Defense Federal Acquisition Regulations. Next, your will discover the NIST Special Publication 800-171 series. Then, you’ll understand the structure of the CMMC model, including its levels, controls, and practices. Finally, you’ll be able to understand the challenges and process involved with achieving all 3 Levels of the CMMC Maturity Model. By the end of this course, you’ll understand how the CMMC could apply to the various scenarios in which defense contractors may be situated.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Understanding the CMMC
Implementing the CMMC
Achieving CMMC Certification
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Suitable for defense contractors, security professionals, and individuals requiring a foundational understanding of the CMMC requirement
Delves into the NIST Special Publication 800-171 series, aligning with industry standards and best practices in cybersecurity
Taught by Bobby Rogers, an experienced instructor in cybersecurity and compliance
Provides a comprehensive understanding of CMMC levels, controls, and practices, enabling learners to implement and achieve compliance effectively

Save this course

Save Security Compliance: CMMC to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Security Compliance: CMMC with these activities:
Refresher on Cybersecurity Fundamentals
Review basic cybersecurity concepts such as information security, risk management, and threat detection to strengthen foundational knowledge
Show steps
  • Review textbooks or online resources on cybersecurity fundamentals
  • Practice applying security principles to real-world scenarios
Explore NIST Special Publication 800-171 Series
Familiarize yourself with the NIST guidelines to gain a solid understanding of CMMC requirements.
Show steps
  • Review NIST 800-171: Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations
  • Explore NIST 800-171A: Assessing Security Requirements for Controlled Unclassified Information
CMMC Study Group
Join a study group with peers to discuss CMMC concepts, share insights, and reinforce understanding through collaborative learning
Show steps
  • Find and join a study group
  • Review materials and prepare questions
  • Participate actively in group discussions
Five other activities
Expand to see all activities and additional details
Show all eight activities
Practice Identifying and Implementing CMMC Controls
Engage in practical exercises to cement your understanding and ability to apply CMMC controls effectively.
Browse courses on Cybersecurity Controls
Show steps
  • Review the CMMC framework and identify key controls
  • Simulate scenarios and implement appropriate controls
CMMC Implementation Workshop
Attend a hands-on workshop that provides practical guidance and insights on CMMC implementation, enhancing knowledge and skills
Show steps
  • Register for the workshop
  • Prepare for the workshop by reviewing materials
  • Actively participate in the workshop sessions
Create a CMMC Implementation Plan
Develop a comprehensive plan to guide your organization's journey towards CMMC compliance, ensuring a structured and effective implementation process.
Browse courses on Risk Management
Show steps
  • Conduct a risk assessment to identify potential vulnerabilities
  • Establish a roadmap for implementing CMMC controls
  • Budget for resources and timeline
NIST SP 800-171 controls practice
Practice applying the NIST SP 800-171 controls to real-world scenarios to reinforce understanding and improve implementation skills
Show steps
  • Review NIST SP 800-171 controls
  • Identify applicable controls for a given scenario
  • Develop implementation plans for the selected controls
Present on CMMC Benefits and Challenges
Enhance your communication and presentation skills while sharing your knowledge of CMMC. By presenting to others, you reinforce your understanding and gain valuable feedback.
Browse courses on Cybersecurity Awareness
Show steps
  • Research the benefits and challenges of CMMC implementation
  • Prepare a presentation outlining key points
  • Deliver your presentation to an audience

Career center

Learners who complete Security Compliance: CMMC will develop knowledge and skills that may be useful to these careers:
Cybersecurity Analyst
Cybersecurity Analysts are responsible for protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. In this role, you would use your knowledge of CMMC to implement and manage cybersecurity controls to protect sensitive government data. This course can help you gain the skills and knowledge needed to succeed in this role by providing a comprehensive overview of the CMMC framework and its requirements.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to protect their information systems and networks. In this role, you would use your knowledge of CMMC to help organizations assess their security risks and develop and implement security plans. This course can help you gain the skills and knowledge needed to succeed in this role by providing a comprehensive overview of the CMMC framework and its requirements.
Security Operations Analyst
Security Operations Analysts monitor and analyze security events to identify and respond to threats. In this role, you would use your knowledge of CMMC to help organizations monitor and respond to security incidents that could impact CMMC compliance. This course can help you gain the skills and knowledge needed to succeed in this role by providing a comprehensive overview of the CMMC framework and its requirements.
Information Security Manager
Information Security Managers are responsible for developing and implementing policies and procedures to protect an organization's information assets. In this role, you would use your knowledge of CMMC to ensure that your organization's information systems and networks are compliant with CMMC requirements. This course can help you gain the skills and knowledge needed to succeed in this role by providing a comprehensive overview of the CMMC framework and its requirements.
Security Architect
Security Architects design and implement security measures to protect an organization's information systems and networks. In this role, you would use your knowledge of CMMC to design and implement security controls that meet CMMC requirements. This course can help you gain the skills and knowledge needed to succeed in this role by providing a comprehensive overview of the CMMC framework and its requirements.
Security Engineer
Security Engineers design, implement, and maintain security controls to protect an organization's information systems and networks. In this role, you would use your knowledge of CMMC to implement and manage security controls that meet CMMC requirements. This course can help you gain the skills and knowledge needed to succeed in this role by providing a comprehensive overview of the CMMC framework and its requirements.
Software Engineer
Software Engineers design, develop, and maintain software applications. In this role, you would use your knowledge of CMMC to ensure that software applications are developed and maintained in a secure manner that meets CMMC requirements. This course can help you gain the skills and knowledge needed to succeed in this role by providing a comprehensive overview of the CMMC framework and its requirements.
Database Administrator
Database Administrators are responsible for managing and maintaining databases. In this role, you would use your knowledge of CMMC to ensure that databases are managed and maintained in a secure manner that meets CMMC requirements. This course can help you gain the skills and knowledge needed to succeed in this role by providing a comprehensive overview of the CMMC framework and its requirements.
Network Administrator
Network Administrators are responsible for designing, implementing, and maintaining computer networks. In this role, you would use your knowledge of CMMC to ensure that networks are designed and maintained in a secure manner that meets CMMC requirements. This course can help you gain the skills and knowledge needed to succeed in this role by providing a comprehensive overview of the CMMC framework and its requirements.
Cloud Architect
Cloud Architects design and implement cloud computing solutions. In this role, you would use your knowledge of CMMC to ensure that cloud computing solutions are designed and implemented in a secure manner that meets CMMC requirements. This course can help you gain the skills and knowledge needed to succeed in this role by providing a comprehensive overview of the CMMC framework and its requirements.
Systems Administrator
Systems Administrators are responsible for maintaining and managing computer systems and networks. In this role, you would use your knowledge of CMMC to ensure that systems and networks are configured and maintained in a secure manner that meets CMMC requirements. This course can help you gain the skills and knowledge needed to succeed in this role by providing a comprehensive overview of the CMMC framework and its requirements.
Cybersecurity Consultant
Cybersecurity Consultants provide advice and guidance to organizations on how to protect their computer systems and networks from cyber threats. In this role, you would use your knowledge of CMMC to help organizations assess their security risks and develop and implement cybersecurity plans that meet CMMC requirements. This course can help you gain the skills and knowledge needed to succeed in this role by providing a comprehensive overview of the CMMC framework and its requirements.
Computer Security Analyst
Computer Security Analysts are responsible for analyzing security threats and vulnerabilities and developing and implementing security measures to protect computer systems and networks. In this role, you would use your knowledge of CMMC to assess security risks and develop and implement security plans that meet CMMC requirements. This course can help you gain the skills and knowledge needed to succeed in this role by providing a comprehensive overview of the CMMC framework and its requirements.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain cybersecurity systems and networks. In this role, you would use your knowledge of CMMC to design and implement cybersecurity controls that meet CMMC requirements. This course can help you gain the skills and knowledge needed to succeed in this role by providing a comprehensive overview of the CMMC framework and its requirements.
Computer Security Specialist
Computer Security Specialists are responsible for protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. In this role, you would use your knowledge of CMMC to implement and manage cybersecurity controls to protect sensitive data. This course can help you gain the skills and knowledge needed to succeed in this role by providing a comprehensive overview of the CMMC framework and its requirements.

Reading list

We've selected five books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Compliance: CMMC.
This NIST publication is the foundation for the CMMC requirements. It provides detailed guidance on how to protect controlled unclassified information.
Provides a catalog of security and privacy controls that can be used to protect information systems and organizations.
Provides insights into the techniques used by hackers and how to defend against them.
Provides techniques for gathering and analyzing open source intelligence, which can be useful for threat intelligence and risk assessment.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Compliance: CMMC.
Security Governance: FISMA
Most relevant
Applying the Digital Playbook in Government: Industry...
Introduction to Azure Government
Configuring Firepower Threat Defense (FTD) Integrations
U.S. Political Institutions: Congress, Presidency, Courts...
IT Security Champion: Cyber Threat Intel and Emerging...
Introduction to Key Constitutional Concepts and Supreme...
Configuring Firepower Threat Defense (FTD) NetOps Features
Translating Research to Patients
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser