• Online, Self-Paced
Course Description

This self-guided online course for defense suppliers will significantly enhance U.S. government supplier/contractor understanding of the information provided in the CMMC 2.0 Assessment Level 2 Guide and CMMC Reference/Source documents, as well as the controls in NIST SP 800-171.

Learning Objectives

*Understand the CMMC 2.0 Model, the 14 domains, Level 1 and Level 2 practices, processes, and supporting documentation
*Understand all controls in NIST SP 800-171
*Define and differentiate between FCI, CTI, COTS and CUI
*Apply best practices to guide and help your organization gain CMMC Level 2 certification and tailor your approach to accommodate different environments
*Define, examine, and self-evaluate practice sufficiency, implementation and performance
*Differentiate methods of defining maturity of practice, including: Adequacy – Do we have the right information? and Sufficiency – Do we have enough data?
*Prepare for a CMMC Level 2 assessment using the recommended CMMC Assessment Process
*Describe best practices for CMMC process requirements: policies, procedures, and plans
*Clearly understand CMMC practice objectives, scoping/assessment boundaries, validation criteria, types of objective evidence required, what assessors are looking for, who assessors want to talk to, and the types of questions that may be asked.
*Practice using CMMC 2.0 Level 2 Mock Assessment scenarios

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Operational Planning
  • Cybersecurity Management
  • Risk Management
  • Program/Project Management and Acquisition
  • Strategic Planning and Policy

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.