Course Catalog
CMMC Kickstart: A Practical Guide to Preparing for CMMC Certification
Code: CMMC Kickstart
Duration: 1 Day
$799 USD

OVERVIEW

The Cybersecurity Maturity Model Certification (CMMC), managed by the CMMC Accreditation Body (CMMCAB), is a Department of Defense (DoD) program through which an organization's cybersecurity program is measured by their initial and ongoing compliance with applicable cybersecurity practices as well as their integration of corresponding policies and plans into their overall business operations. By Fiscal Year 2026, all organizations providing products or services to the U.S. DoD must obtain at least a Maturity Level 1 certification under this program. This course will help you and your organization understand and plan for the impact of CMMC

DELIVERY FORMAT

This course is available in the following formats:

Virtual Classroom

Duration: 1 Day
Classroom

Duration: 1 Day

CLASS SCHEDULE
Call 800-798-3901 to enroll in this class!

GOALS

In this course, you will identify the key elements and potential impacts of the Cybersecurity Maturity Model Certification (CMMC) program. You will:

  • Identify the crucial elements that are driving the CMMC initiative.
  • Describe the architecture of the CMMC Model and the rationale behind it.
  • Use the Assessment Guides to prepare your organization for a successful CMMC assessment.
  • Identify the roles and responsibilities in the CMMC ecosystem and during an Assessment.
OUTLINE

Lesson One: Identifying What’s at stake

Topic A: Identify the Threats and Regulatory Responses

  • Identify the threats to the Defense Industrial Base and the established regulations that protect the defense supply chain.
    • Basic DFARs cybersecurity clauses
    • NIST SP 800-171

Topic B: Identify Sensitive Information

  • Identify the main categories of sensitive information--FCI and CUI.

 

Lesson Two: Describing the CMMC Program

Topic A: Describe the Rationale for CMMC

  • Describe why the CMMC program was created.

Topic B: Describe the CMMC Model Architecture

  • Describe the components of the CMMC Model.
    • Cybersecurity Practices
    • Maturity Process
    • Five Levels
      • CMMC Level 1
      • CMMC Level 2
      • CMMC Level 3
      • CMMC Level 4
      • CMMC Level 5

 

Lesson Three: Getting Ready for a CMMC Assessment

Topic A: Scope Your Environment

  • Identify the people, systems and processes in your environment that will be evaluated in a CMMC assessment.
    • Follow the data
    • PCI DSS
    • Size
      • Enterprise
      • Business Line
      • Enclave

Topic B: Analyze the CMMC Assessment Guides

  • Analyze the Assessment Guides to be able to align your practices and processes to the CMMC requirements.
    • Case Study - Access Control

Topic C: Evaluate Your Readiness

  • Explore methods of validating your compliance with the CMMC requirements.
    • Hiring a consultant
      • RP/RPO vs Non
  • Self Assessment
  • Mock Assessments

 

Lesson Four: Interacting with the CMMC Ecosystem

Topic A: Identify the CMMC Ecosystem

  • Identify the roles and responsibilities of the organizations and individuals involved in the CMMC program.
    • Department of Defense, Department of Homeland Security, NASA, GSA
    • CMMC-AB
    • C3PAOs
    • Assessors
    • RP/RPO

Topic B: Describe a CMMC Assessment

  • Describe the interactions between your organization and the assessor during a CMMC assessment.
    • Contracting with a C3PAO
    • Pre-on-site activities
    • On-site activities
    • Post assessment activities

Appendix A: CMMC Documentation and Related Sites

Appendix B: Useful Certifications for Cybersecurity Professionals

  • Security +
  • CISSP
  • CISA
  • CISM

Lesson One: Identifying What’s at stake

Topic A: Identify the Threats and Regulatory Responses

  • Identify the threats to the Defense Industrial Base and the established regulations that protect the defense supply chain.
    • Basic DFARs cybersecurity clauses
    • NIST SP 800-171

Topic B: Identify Sensitive Information

  • Identify the main categories of sensitive information--FCI and CUI.

 

Lesson Two: Describing the CMMC Program

Topic A: Describe the Rationale for CMMC

  • Describe why the CMMC program was created.

Topic B: Describe the CMMC Model Architecture

  • Describe the components of the CMMC Model.
    • Cybersecurity Practices
    • Maturity Process
    • Five Levels
      • CMMC Level 1
      • CMMC Level 2
      • CMMC Level 3
      • CMMC Level 4
      • CMMC Level 5

 

Lesson Three: Getting Ready for a CMMC Assessment

Topic A: Scope Your Environment

  • Identify the people, systems and processes in your environment that will be evaluated in a CMMC assessment.
    • Follow the data
    • PCI DSS
    • Size
      • Enterprise
      • Business Line
      • Enclave

Topic B: Analyze the CMMC Assessment Guides

  • Analyze the Assessment Guides to be able to align your practices and processes to the CMMC requirements.
    • Case Study - Access Control

Topic C: Evaluate Your Readiness

  • Explore methods of validating your compliance with the CMMC requirements.
    • Hiring a consultant
      • RP/RPO vs Non
  • Self Assessment
  • Mock Assessments

 

Lesson Four: Interacting with the CMMC Ecosystem

Topic A: Identify the CMMC Ecosystem

  • Identify the roles and responsibilities of the organizations and individuals involved in the CMMC program.
    • Department of Defense, Department of Homeland Security, NASA, GSA
    • CMMC-AB
    • C3PAOs
    • Assessors
    • RP/RPO

Topic B: Describe a CMMC Assessment

  • Describe the interactions between your organization and the assessor during a CMMC assessment.
    • Contracting with a C3PAO
    • Pre-on-site activities
    • On-site activities
    • Post assessment activities

Appendix A: CMMC Documentation and Related Sites

Appendix B: Useful Certifications for Cybersecurity Professionals

  • Security +
  • CISSP
  • CISA
  • CISM
LABS

Will Be Updated Soon!
Will Be Updated Soon!
WHO SHOULD ATTEND

This course provides an introductory overview of the CMMC program for organizational decision makers. Business and IT leaders and IT staff might consider taking this course to learn about the CMMC Model to get a sense of what's required for a successful assessment, and the various ways they can start preparing.

PREREQUISITES

None