top of page

About

The Cybersecurity Maturity Model Certification (CMMC) framework is a verification mechanism designed to measure the organizations’ maturity regarding the protection of unclassified information such as Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).


CMMC is a new set of cybersecurity standards that encompasses various cybersecurity standards, references, and other best practices. It comprises a number of processes and practices which are mapped across five cumulative certification levels.


The CMMC model is developed and managed by the Department of Defense (DoD) and is considered to be the DoD’s response to potential compromises of sensitive information that resides on Defense Industrial Base (DIB) systems and networks. CMMC Accreditation Body (CyberAB), on the other hand, is the sole authoritative source for the operationalization of CMMC assessments and training.


Why Should You take this CMMC Foundations Course?


The PECB CMMC Foundations training course allows you to learn more about the structure of the CMMC model, including CMMC levels, domains, and practices. You will also gain basic knowledge related to the CMMC ecosystem, the CMMC assessment process, and the CMMC Code of Professional Conduct.


The successful completion of the training course is followed by an exam. A PECB CMMC Foundations certificate demonstrates that you comprehend the CMMC model, are able to identify the requirements for CMMC levels, and have the basic knowledge to help an organization in implementing the CMMC requirements.


Why is CMMC Important?


As in any other area, the large number of security incidents has also affected the Defense Industrial Base and the supply chain of the Department of Defense (DoD). The DoD is aware that, in order to decrease the risk related to national economic security and in general the national security, it should be focused on protecting its unclassified information.


Therefore, the DoD released the CMMC framework which assesses and enhances the cybersecurity posture of organizations throughout the DoD contractor community. Since CMMC is a cybersecurity standard, the CMMC certification will eventually be required for all DoD contractors, including small businesses, commercial item contractors, and other suppliers.


The CMMC training courses will help you acquire knowledge on CMMC domains, practices, and processes and understand how they may be applied within the DoD supply chain. In addition, CMMC training courses will help you understand the CMMC certification process and prepare you for your role in the CMMC-AB ecosystem.


The PECB CMMC Foundations training course enables participants to understand the fundamental concepts, definitions, and approaches of the CMMC model.




Who Should Attend?


This training course is intended for:


  • Individuals interested in being part of the CMMC ecosystem


  • Individuals seeking to gain knowledge about the CMMC model


  • Individuals interested in using the CMMC model


  • Suppliers of the Department of Defense (DoD) and Defense Industrial Base (DIB) and other organizations seeking CMMC certification


Learning Objectives


This training course allows you to:


  • Describe the basic concepts, definitions, and approaches of the CMMC model


  • Get acquainted with the CMMC levels, domains, and practices


  • Explain how CMMC model could be applied in the supply chain of the Department of Defense (DoD) and the Defense Industrial Base (DIB) sector


Educational Approach

This training course is participant centered and:


  • Contains lecture sessions illustrated with graphics, examples, and discussions


  • Encourages interaction between participants by means of questions, suggestions, quizzes, etc.


  • Includes quizzes which are a simulation of the questions of the final exam


Prerequisites

There are no prerequisites to participate in this training course.

Untitled design (15).png

Modules

AIGP.png

Module 1 : Identifying Security Compliance Measures

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

image 38.png

Module 2 : Recognizing and Addressing Social Engineering Attack

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

image 38.png

Module 3 : Securing Devices

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

image 38.png

Module 4 : Using the Internet Securely

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

Soft Gradient Background

Receive an Official ISACA Certificate

LinkedIn_logo_initials.png

Receive a LinkedIn Badge

Gain a Certificate After Completion

Highlight your achievement by adding this credential to your LinkedIn profile, CV, or résumé. Your digital certificate will be awarded upon successful completion of the programme, giving you a recognised credential to share with employers, colleagues, and clients.

Course Certificate.png
Rock Logo
Basic elements of AI and machine learning
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
Basic elements of AI and machine learning
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png

Exam Details

The exam fully meets the requirements of the PECB Examination and Certificate Programme. 


It covers the following competency domains:


Domain 1: Fundamental concepts of the CMMC model, CMMC ecosystem, and code of professional conduct


Domain 2: CMMC domains, practices, and assessment process

Course Study Options

Self Study

Online Study at Your Own Pace

In-Person Training

12 Locations in Middle East. View

Live Online Training

Course Duration : Flexible

Soft Gradient Background
sandra 1.png

Discuss This Course With Us

Hello, I’m Sandra, Assistant Manager at MENA Executive Training.

I'm here to talk you through the details of this course, answer any questions you may have and help get you booked in!

You May Also Be Interested In

Rock Logo
IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
Basic elements of AI and machine learning
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Soft Gradient Background
Mena Executive Training
a.jpg

Cybersecurity Maturity Model Certification (CMMC) | Foundations

Taught : Online & In-Person & Self-Study

Official Training

Language : undefined

Duration : Flexible

Rock Logo
bottom of page