Objective
The Defense Industrial Base(DIB) sector consists of companies that contribute to research, engineering,production, delivery, operations, installation, and support services. The cyberactors continue to target the DIB sector and the Department of Defense (DoD)supply chain for intellectual property and unclassified information. The DoDhas released the Cybersecurity Maturity Model Certification (CMMC) to ensureappropriate levels of cybersecurity controls, and processes are adequate and inplace to protect Controlled Unclassified Information (CUI) on DoD contractorsystems.
The course starts with thedetails about the CMMC model structure (domains, capabilities, practices, andprocesses), how the model works, five process maturity levels, and fivetechnical practices. The course includes deep dive to learn about the Audit andAccounting Controls, Configuration Management controls, Identification &Authentication controls, Maintenance controls, and Media Protection Controls.
This interactive trainingcourse will ensure professionals and practitioners at all levels understandtheir roles and responsibilities, new developments, resources, and hallmarks ofan effective compliance program. In this course, you will be asked to readthrough lessons, participate in learning activities, and partake in knowledgechecks designed to reinforce learning, followed by the end of the course finalassessment.
What you will learn:
• Understand the CMMC Model and controls
• Interpret the NIST SP 800-171Controls and apply the control guidance in gap analysis, remediation, and implementing controls
• Understand the specific domains:
• Audit & Accounting - Define audit requirements, perform auditing, Identify and protect audit information, Review and manage audit logs
• Configuration Management -Establish configuration baselines, Perform configuration and change management
• Identification and Authentication - Grant access to authenticated entities, Incident Response -Plan incident response, Detect and report events, Develop and implement a response to a declared incident, Perform post-incident reviews, Test incident response
• Maintenance - Manage maintenance
• Media Protection - Identify and mark media, Protect and control media, Sanitize media, Protect media during transport
Advanced Persistent Threat or Intrusion
What you will learn:
|
Anti Money Laundering (AML) Awareness
What you will learn:
- What it is and how does it work?
- Why people and organizations launder money?
- How money laundering works: basic process
- Legal consequences for money laundering, including state and federal (U.S.) penalties
- Applicable laws and regulation
- Insider trading
Architectural Solutions
What you will learn:
|
Asset Management
What you will learn:
|
Backup and Recovery
What you will learn:
|
Breach Management
What you will learn:
What you will learn:
The training promotes the objectiveof informed management for better decision-making. raining provides managementand employees with a basic understanding of underlying concepts and recommendationsfor managing challenges. Each section informed you about additional trainingrequirements and recommended courses. In the next 10minutes, you will learn:
- What is the importance of abreach notification?
- What is a data breach?
- In what circumstances wouldnotification of a data breach be required and to whom?
- Suggested e-Learning courses toenhance the knowledge.
(Note - The suggested e-Learningprogram is a two-part series.)
Breach Notification Part I - Awareness
What you will learn:
- What is the importance of a breach notification?
- What is a data breach?
- In what circumstances would notification of a data breach be required and to whom?
- When and how should notification of a data breach be provided?
- Framework for Effective Data Breach Notification Legislation
- Timing of Notification to Affected Individuals
- Post Data Breach Immediate Action Items
- Breach Notification to Authorities
Breach Notification Part II - Advanced
What you will learn:
- Breach Management
- Effective Breach Response
- Data Breach Checklist
- Breach Notification Notice Content
- Notification Timelines
- Lifecycle of a Data Breach
- Public Relations Strategy
Bring Your Own Device
What you will learn:
|
Business Continuity & Disaster Recovery (BCP / DR) Part I - Awareness
What you will learn:
- Disaster
- Business Continuity and Disaster Recovery
- Use Cases
- Risks Covered by DR
- Driving Factors
- Challenges in Developing DR Plan
- Technical Challenges
- Key Factors in DR Plan