When educating people on a complex, multi-dimensional topic, the best place to start is with its key, foundational information. That’s exactly what Celerium’s Certified CMMC Professional Course (CCP) does – it conveys the fundamental knowledge needed to train professionals supporting the implementation of CMMC.
Access Control (AC)
Audit & Accountability (AU)
Awareness & Training (AT)
Configuration Management (CM)
Identification & Authentication (IA)
Incident Response (IR)
Maintenance (MA)
Media Protection (MP)
Personnel Security (PS)
Physical Protection (PE)
Risk Assessment (RA)
Security Assessment (CA)
Systems & Communications Protection (SC)
System & Information Integrity (SI)
Sponsored by Celerium
Sponsored by Celerium
These online-only courses provide CMMC training to companies looking to comply with CMMC. The courses are created by an experienced team of cybersecurity implementers with years of experience on NIST standards.
Implementing CMMC will be different for every company. And with the U.S. government doubling down on cybersecurity, it's important to get it right. So where is the best place to start?
Our CMMC Insights courses were created to help companies looking to comply with CMMC understand how to implement the practices. Our team has years of experience implementing NIST 800-53.
One-year access to the learning portal is provided, and we will provide updates on changes to CMMC as clarity is provided on items such as reciprocity. Don't wait -- get started on your CMMC assessment preparation now.
DOMAIN: System and Information Integrity |
Practice:SI.L1-3.14.1
|
CAPABILITY: C040 Identify and manage information flaws
|
Identify, report, and correct information and information system flaws in a timely manner. |
Threat Actors:
A wildly successful attack vector used by threat actors is the exploitation of unpatched system vulnerabilities. Failing to remain current on various software/system patches can greatly increase your attack surface and result in compromise.
Assessment NOTES: A CMMC assessor may want to review, observe, or test the following· Policy or procedures that address flaw remediation,
· Security-relevant software updates (patches, service pack updates, hot fixes, or signature updates) in response to reported system flaws or vulnerabilities,
Click here to see details
Practice:SI.L1-3.14.2
|
CAPABILITY: C041 Identify malicious content
|
Provide protection from malicious code at appropriate locations within organizational information systems. |
Threat Actors:
There are several methods in which threat actors can deliver malicious code to your system:
i) Email/phishing
ii) Malicious websites
iii) Portable storage devices such as thumb drives, etc
iv) Off the shelf commercial software packages
Assessment NOTES: A CMMC assessor may want to review, observe, or test the followingAn inventory of malicious code protections provided to systems at designated locations.
Click here to see details
Copyright © 2022 Celerium. All Rights Reserved.