🚀 Cyber Phoenix is moving to LEXX. Click here to access it directly: lexx.com

Business Courses Premium Course

Access Control (CMMC)

Take this Course
Access Control (CMMC)

Course Overview

Understand and implement essential access control measures to protect sensitive information, focusing on user permissions, authentication, and monitoring in compliance with CMMC.

Inside the Course

45 Lessons

1
Access Control (AC)
2
AC.L1-b.1.i Authorized Access Control - Why Behind
3
AC.L1-b.1.i Authorized Access Control - Evidence
4
AC.L1-b.1.ii Transaction & Function Control -Why Behind
5
AC.L1-b.1.ii Transaction & Function Control - Evidence
6
AC.L1-b.1.iii External Connections - Why Behind
7
AC.L1-b.1.iii External Connections - Evidence
8
AC.L1-b.1.iv Control Public Information - Why Behind
9
AC.L1-b.1.iv Control Public Information - Evidence
10
AC.L2-3.1.3 Control CUI Flow - Why Behind
11
AC.L2-3.1.3 Control CUI Flow - Evidence
12
AC.L2-3.1.4 Separation of Duties - Why Behind
13
AC.L2-3.1.4 Separation of Duties - Evidence
14
AC.L2-3.1.5 Least Privilege - Why Behind
15
AC.L2-3.1.5 Least Privilege - Evidence
16
AC.L2-3.1.6 Non-Privileged Account Use - Why Behind
17
AC.L2-3.1.6 Non-Privileged Account Use - Evidence
18
AC.L2-3.1.7 Privileged Functions - Why Behind
19
AC.L2-3.1.7 Privileged Functions-Evidence
20
AC.L2-3.1.8 Unsuccessful Logon Attempts - Why Behind
21
AC.L2-3.1.8 Unsuccessful Logon Attempts-Evidence
22
AC.L2-3.1.9 Privacy & Security Notices - Why Behind
23
AC.L2-3.1.9 Privacy & Security Notices - Evidence
24
AC.L2-3.1.10 Session Lock - Why Behind
25
AC.L2-3.1.10 Session Lock - Evidence
26
AC.L2-3.1.11-Session Termination - Why Behind
27
AC.L2-3.1.11-Session Termination - Evidence
28
AC.L2-3.1.12- Control Remote Access -Why Behind
29
AC.L2-3.1.12 Control Remote Access - Evidence
30
AC.L2-3.1.13 Remote Access Confidentiality - Why Behind
31
AC.L2-3.1.13 Remote Access Confidentiality - Evidence
32
AC.L2-3.1.14 Remote Access Routing - Why Behind
33
AC.L2-3.1.14 Remote Access Routing - Evidence
34
AC.L2-3.1.15 Privileged Remote Access - Why Behind
35
AC.L2-3.1.15 Privileged Remote Access - Evidence
36
AC.L2-3.1.16 Wireless Access Authorization - Why Behind
37
AC.L2-3.1.16 Wireless Access Authorization - Evidence
38
AC.L2-3.1.17 Wireless Access Protection - Why Behind
39
AC.L2-3.1.17 Wireless Access Protection - Evidence
40
AC.L2-3.1.18 Mobile Device Connection -Why Behind
41
AC.L2-3.1.18 Mobile Device Connection - Evidence
42
AC.L2-3.1.19 Encrypt CUI on Mobile - Why Behind
43
AC.L2-3.1.19 Encrypt CUI on Mobile - Evidence
44
AC.L2-3.1.21 Portable Storage Use - Why Behind
45
AC.L2-3.1.21 Portable Storage Use - Evidence

Subscribe & Start Learning

This course is part of our Premium collection of courses. This package is perfect for professionals and teams looking to take their skills to the next level. Gain access to a wide range of sophisticated courses.

Subscribe & Start Learning

Our Basic plan is perfect for students taking their first steps into leadership, IT management, or cybersecurity. Get comfortable. Feel it out. Learn what you love and what you don’t love. Start learning today with a 7 Day Free Trial!