Quantcast
Channel: Technology Advancement Center
Viewing all articles
Browse latest Browse all 83

Cyber AB Certified CMMC Professional (CCP)

$
0
0

Course Overview

This course prepares students for the Certified CMMC Professional (CCP) certification, which authorizes the holder to use The Cyber AB Certified CMMC Professional logo, to participate as an Assessment Team Member under the supervision of a Lead Assessor, and to be listed in the CMMC Marketplace. The CCP certification is also prerequisite for the Certified CMMC Assessor (CCA) certification.

In this course, you will learn about the CMMC Model, framework, context, and application within the DoD, as well as the expectations and requirements imposed upon organizations that do business with the DoD. It will also help students to identify threats to cybersecurity and privacy within an IoT ecosystem and implement appropriate countermeasures. 

You will: 

  • Identify the threats to the Defense Supply Chain and the established regulations and standards for managing the risk. 
  • Identify the sensitive information that needs to be protected within the Defense Supply Chain and how to manage it. 
  • Describe how the CMMC Model ensures compliance with federal acquisitions regulations. 
  • Identify responsibilities of the Certified CMMC Professional, including appropriate ethical behavior. 
  • Establish the Certification and Assessment scope boundaries for evaluating the systems that protect regulated information. 
  • Prepare the OSC for an Assessment by evaluating readiness. 
  • Use the CMMC Assessment Guides to determine and assess the Evidence for practices. 
  • Implement and evaluate practices required to meet CMMC Level 1. 
  • Identify the practices required to meet CMMC Level 2. 
  • As a CCP, work through the CMMC Assessment process. 

 Duration 


5 Days

Certifications 


Certified CMMC Professional (CCP)


Course Outline

Lesson 1: Managing Risk within the Defense Supply Chain 

  • Topic A: Identify Threats to the Defense Supply Chain
  • Topic B: Identify Regulatory Responses against Threats

Lesson 2: Handling Sensitive Information 

  • Topic A: Identify Sensitive Information
  • Topic B: Manage the Sensitive Information

Lesson 3: Ensuring Compliance through CMMC 

  • Topic A: Describe the CMMC Model Architecture
  • Topic B: Define the CMMC Program and Its Ecosystem
  • Topic C: Define Self-Assessments

Lesson 4: Performing CCP Responsibilities 

  • Topic A: Identify Responsibilities of the CCP
  • Topic B: Demonstrate Appropriate Ethics and Behavior

Lesson 5: Scoping Certification and Assessment Boundaries 

  • Topic A: Use the CMMC Assessment Scope Documentation
  • Topic B: Get Oriented to the OSC Environment
  • Topic C: Determine How Sensitive Information Moves
  • Topic D: Identify Systems in Scope
  • Topic E: Limit Scope

Lesson 6: Preparing the OSC 

  • Topic A: Foster a Mature Cybersecurity Culture
  • Topic B: Evaluate Readiness

Lesson 7: Determining and Assessing Evidence 

  • Topic A: Determine Evidence
  • Topic B: Assess the Practices Using the CMMC Assessment Guides

Lesson 8: Implementing and Evaluating Level 1 

  • Topic A: Identify CMMC Level 1 Domains and Practices
  • Topic B: Perform a CMMC Level 1 Gap Analysis
  • Topic C: Assess CMMC Level 1 Practices

Lesson 9: Identifying Level 2 Practices 

  • Topic A: Identify CMMC Level 2 Practices

Lesson 10: Working through an Assessment 

  • Topic A: Identify Assessment Roles and Responsibilities
  • Topic B: Plan and Prepare the Assessment
  • Topic C: Conduct the Assessment
  • Topic D: Report the Assessment Results
  • Topic E: Conduct the CMMC POA&M Close-Out Assessment

Viewing all articles
Browse latest Browse all 83

Trending Articles