Certified CMMC Assessor Domain 4: CMMC Level 2 Practices Course
10 hours, 15 minutes
Syllabus
CMMC Level 2 assessment objectives
Video - 00:08:00
Methods and objects for determining evidence
Video - 00:29:00
Adequacy and sufficiency related to evidence around all practices
Video - 00:02:00
Characteristics of acceptable evidence
Video - 00:05:00
Collect and examine evidence
Video - 00:02:00
Evidence of persistent application of practices
Video - 00:01:00
Evidence - policy
Video - 00:09:00
Evidence - procedure
Video - 00:04:00
Evidence - plans and planning documents
Video - 00:01:00
Evidence - resourcing
Video - 00:05:00
Evidence - communication
Video - 00:01:00
Evidence - training
Video - 00:02:00
Characterization of evidence
Video - 00:02:00
CMMC Level 2 Assessment Practice Objectives Workshop
Video - 00:05:00
Workshop example assessment objectives
Video - 00:29:00
Identifying assessment objectives and creating implementation statements example
Video - 00:10:00
Control CUI flow
Video - 00:04:00
Separation of duties
Video - 00:20:00
Multi-factor authentication
Video - 00:30:00
Least privilege
Video - 00:05:00
Non-privileged account use
Video - 00:11:00
Privileged functions
Video - 00:02:00
Unsuccessful logon attempts
Video - 00:04:00
Privacy and security notices
Video - 00:05:00
Session lock
Video - 00:05:00
Session termination
Video - 00:03:00
Control remote access
Video - 00:03:00
Remote access confidentiality
Video - 00:06:00
Remote access routing
Video - 00:01:00
Privileged remote access
Video - 00:02:00
Wireless access authorization and protection
Video - 00:09:00
Mobile device connection and encryption of CUI
Video - 00:11:00
Portable storage use
Video - 00:04:00
Role-based risk awareness
Video - 00:05:00
Role-based training
Video - 00:10:00
Insider threat awareness
Video - 00:02:00
System auditing
Video - 00:07:00
User accountability
Video - 00:05:00
Event review
Video - 00:05:00
Audit failure alerting
Video - 00:04:00
Audit correlation
Video - 00:05:00
Reduction and reporting
Video - 00:02:00
Authoritative time source
Video - 00:04:00
Audit protection and management
Video - 00:07:00
System baselining
Video - 00:07:00
Security configuration enforcement
Video - 00:04:00
System change management
Video - 00:04:00
Security impact analysis
Video - 00:06:00
Access restrictions for change
Video - 00:02:00
Least functionality
Video - 00:02:00
Nonessential functionality
Video - 00:04:00
Application execution policy
Video - 00:09:00
User-installed software
Video - 00:01:00
Identification and authentication intro
Video - 00:01:00
Replay-resistant authentication
Video - 00:08:00
Identifier reuse
Video - 00:06:00
Identifier handling
Video - 00:08:00
Password complexity
Video - 00:15:00
Password reuse
Video - 00:01:00
Temporary passwords
Video - 00:02:00
Cryptographically-protected passwords
Video - 00:02:00
Obscure feedback
Video - 00:03:00
Incident handling
Video - 00:06:00
Incident reporting
Video - 00:11:00
Incident response testing
Video - 00:03:00
Perform maintenance
Video - 00:05:00
System maintenance control
Video - 00:09:00
Equipment sanitization
Video - 00:07:00
Media inspection
Video - 00:03:00
Nonlocal maintenance
Video - 00:06:00
Maintenance personnel
Video - 00:01:00
Media disposal
Video - 00:02:00
Media protection
Video - 00:04:00
Media access
Video - 00:02:00
Media markings
Video - 00:03:00
Media accountability
Video - 00:05:00
Portable storage encryption
Video - 00:02:00
Removable media
Video - 00:05:00
Shared media
Video - 00:02:00
Protect backups
Video - 00:10:00
Screen individuals
Video - 00:07:00
Personnel actions
Video - 00:08:00
Monitor facility
Video - 00:03:00
Alternative work sites
Video - 00:02:00
Risk assessments
Video - 00:05:00
Vulnerability scan
Video - 00:08:00
Vulnerability remediation
Video - 00:04:00
Security control assessment
Video - 00:07:00
Plan of action
Video - 00:07:00
Security control monitoring
Video - 00:02:00
System security plan
Video - 00:09:00
Security engineering
Video - 00:13:00
Role separation
Video - 00:08:00
Shared resource control
Video - 00:06:00
Network communication by exception
Video - 00:06:00
Split tunneling
Video - 00:02:00
Data in transit
Video - 00:07:00
Connections termination
Video - 00:01:00
Key management
Video - 00:05:00
CUI encryption
Video - 00:02:00
Collaborative device control
Video - 00:03:00
Mobile code
Video - 00:04:00
Voice over internet protocol
Video - 00:08:00
Communications authenticity
Video - 00:02:00
Data at rest
Video - 00:01:00
Security alerts and advisories
Video - 00:06:00
Monitor communications for attacks
Video - 00:04:00
Identify unauthorized use
Video - 00:05:00
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
Infosec Skills Teams
$799 per license / year
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps