When educating people on a complex, multi-dimensional topic, the best place to start is with its key, foundational information. That’s exactly what Celerium’s Certified CMMC Professional Course (CCP) does – it conveys the fundamental knowledge needed to train professionals supporting the implementation of CMMC.
Access Control (AC)
Audit & Accountability (AU)
Awareness & Training (AT)
Configuration Management (CM)
Identification & Authentication (IA)
Incident Response (IR)
Maintenance (MA)
Media Protection (MP)
Personnel Security (PS)
Physical Protection (PE)
Risk Assessment (RA)
Security Assessment (CA)
Systems & Communications Protection (SC)
System & Information Integrity (SI)
Sponsored by Celerium
Sponsored by Celerium
These online-only courses provide CMMC training to companies looking to comply with CMMC. The courses are created by an experienced team of cybersecurity implementers with years of experience on NIST standards.
Implementing CMMC will be different for every company. And with the U.S. government doubling down on cybersecurity, it's important to get it right. So where is the best place to start?
Our CMMC Insights courses were created to help companies looking to comply with CMMC understand how to implement the practices. Our team has years of experience implementing NIST 800-53.
One-year access to the learning portal is provided, and we will provide updates on changes to CMMC as clarity is provided on items such as reciprocity. Don't wait -- get started on your CMMC assessment preparation now.
DOMAIN: Awareness and Training |
Practice:AT.L2-3.2.1
|
CAPABILITY: C011 Conduct security awareness activities
|
Ensure that managers, system administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems. |
Assessment NOTES: A CMMC assessor may want to review, observe, or test the following
· Documented policy and procedures related to security awareness program.
· Evidence that all system users, managers, and system administrators have received initial and annual training aligned with their roles and responsibilities.
· Evidence that initial training is provided to users prior to granting access to the system.
· Additional evidences such as communications when new risks/threats impose a risk.
Organizations should consider the content and frequency of security awareness training based on threats and risks to the organization.
Click here to see details
Practice:AT.L2-3.2.2
|
CAPABILITY: C012 Conduct training
|
Ensure that personnel are trained to carry out their assigned information security-related duties and responsibilities. |
Assessment NOTES: A CMMC assessor may want to review, observe, or test the following
· Type of training employees with security-related duties receive beyond that provided to employees without security specific responsibilities.
· Training material to determine if adequate security training is provided to personnel e.g., physical and technical safeguards and countermeasures against threats to the organization.
Organizations must determine the content and frequency of security training based on the roles and responsibilities of employees.
Click here to see details
Practice:AT.L2-3.2.3
|
CAPABILITY: C011 Conduct security awareness activities
|
Provide security awareness training on recognizing and reporting potential indicators of insider threat. |
Threat Actors:
An insider threat can reveal:
i) Details about an organization’s security practices
ii) Customer and employee data
iii) Login credentials and sensitive financial records
Assessment NOTES: A CMMC assessor may want to review, observe, or test the followingTraining records and content of the delivered training to ensure that the training addresses potential indicators and possible precursors of insider threats.
Copyright © 2022 Celerium. All Rights Reserved.