CMMC: Maturity Level 1 – 5 Volume

About this product

This CMMC: Maturity Level 1 – 5 Volume pre-defined course collection is designed to help organizations seeking certification (OSC) for the Cybersecurity Maturity Model Certification (CMMC) satisfy part of their Awareness and Training requirements.

Please see our CMMC Control Mapping Guide for detailed information.

This CMMC: Maturity Level 1 – 5 Volume is unique in that it:

  • Combines the following courses into a single, discounted bundled price:
    • New Employee Onboarding (Management)
    • New Employee Onboarding (Staff)
    • Advanced Persistent Threats (APTs)
    • Breaches
    • Insider Threats
    • Job Duties and Responsibilities
    • Policies, Standards, and Procedures (Management)
    • Policies, Standards, and Procedures (Staff)
    • Security Risks
    • Social Engineering
    • Suspicious Behavior
    • Consolidated Cybersecurity Maturity Level 4 – 5
    • Consolidated Cybersecurity Maturity Level 4 – 5 (Automated Progression)
    • Annual Refresher (Automatically added to your subscription each January)

$16.00




Description

This CMMC: Maturity Level 1 – 5 Volume pre-defined course collection is designed to help organizations seeking certification (OSC) for the Cybersecurity Maturity Model Certification (CMMC) satisfy part of their Awareness and Training requirements.

Please see our CMMC Control Mapping Guide for detailed information.

This CMMC: Maturity Level 1 – 5 Volume is unique in that it:

  • Combines the following courses into a single, discounted bundled price:
    • New Employee Onboarding (Management)
    • New Employee Onboarding (Staff)
    • Advanced Persistent Threats (APTs)
    • Breaches
    • Insider Threats
    • Job Duties and Responsibilities
    • Policies, Standards, and Procedures (Management)
    • Policies, Standards, and Procedures (Staff)
    • Security Risks
    • Social Engineering
    • Suspicious Behavior
    • Consolidated Cybersecurity Maturity Level 4 – 5
    • Consolidated Cybersecurity Maturity Level 4 – 5 (Automated Progression)
    • Annual Refresher (Automatically added to your subscription each January)

Students of this course will learn:

  • New Employee Onboarding (Management)
    • The purpose of the CMMC
    • How the CMMC is structured and its main components
    • A high-level introduction to what’s required to become certified and the entities involved in the certification process
    • How the CMMC applies to the Department of Defense (DoD) supply chain
  • New Employee Onboarding (Staff)
    • The purpose of the CMMC
    • How the CMMC is structured and its main components
    • A high-level introduction to what’s required to become certified and the entities involved in the certification process
    • How the CMMC applies to the Department of Defense (DoD) supply chain
  • Advanced Persistent Threats (APTs)
    • The different types of hackers
    • The main categories of hackers
    • The motivations of advanced persistent threats and the impact they can have on organizations
  • Breaches
    • What a data breach is and the impacts to organizations
    • Which countries are targeted most and the success of attacks
    • What happens to stolen data and how it is used
  • Insider Threats
    • What an insider threat is
    • Common signs of insider threats
    • Steps to take to mitigate insider threat risk
  • Job Duties and Responsibilities
    • Teamwork: How high-performing teams are able to function
    • Roles: The importance of each employee knowing their role
    • Responsibilities: How organizations and employees are reliant on clearly defined responsibilities
  • Policies, Standards, and Procedures (Management)
    • What a policy is, its purpose, value, and examples of common information security policies
    • What a standard is, its purpose and its relationship to a policy and procedure
    • What a procedure is, its purpose, and how it relates to a policy and standard
    • How policies, standards, and procedures are related in an overarching framework
  • Policies, Standards, and Procedures (Staff)
    • What a policy is, its purpose, value, and examples of common information security policies
    • What a standard is, its purpose and its relationship to a policy and procedure
    • What a procedure is, its purpose, and how it relates to a policy and standard
    • How policies, standards, and procedures are related in an overarching framework
  • Security Risks
    • Threat Agents: Examples of cyber threat agents far and near
    • Organizational Cyber Risks: The top cyber risks facing organizations
    • Employee Cyber Risks: The top cyber risks facing employees
    • Cyber Attack Response: What employees should do when a victim of a cyber attack
  • Social Engineering
    • What social engineering means and how hackers use it
    • The difference between phishing, spearphishing, and whaling
    • Common signs of phishing (and vishing and smishing)
  • Suspicious Behavior
    • The most common types of suspicious behavior
    • What to look for in order to identify suspicious behavior
    • Whose responsibility it is to report suspicious behavior
  • Consolidated Cybersecurity Maturity Level 1 – 3
    • Understand the purpose and structure of the CMMC
    • What policies and procedures are, why an organization needs them, and how they apply to your job
    • What some of the major cybersecurity risks are facing the defense industrial base
    • What insider threats are and when risks can be elevated
  • Consolidated Cybersecurity Maturity Level 1 – 3 (Automated Progression)
    • Understand the purpose and structure of the CMMC
    • What policies and procedures are, why an organization needs them, and how they apply to your job
    • What some of the major cybersecurity risks are facing the defense industrial base
    • What insider threats are and when risks can be elevated
  • Annual Refresher (Automatically added to your subscription each January)
    • Provides a refresher of all of the content similar to the Consolidated Cybersecurity course with relevant updates (e.g., changes to the CMMC, attack/threat data, and more)
    • Provided in manual and automated progression formats

Organizational employees who successfully complete each course and the corresponding end of course quiz will earn individual course certificates separately.

This course is provided was developed by Cyber Security Training and Consulting LLC and is hosted on their CyberCertify.me cyber security awareness and training learning management platform.  In addition to CMMC certification courses for OSCs, CyberCertify.me also hosts a 60 Seconds of Cyber security awareness video series and advanced professional certification courses related to Cyber Crisis Management.

CMMC organizations are encouraged to build a culture of security by adding the 60 Seconds of Cyber series to their security awareness program.  This affordable series includes more than 40 short videos on cybersecurity fundamentals, security awareness training videos profiling different hackers from around the world, and security awareness training videos profiling hacker groups from around the world.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.