Course Overview
Learn to manage and verify user identities and credentials, ensuring secure access to systems and data in accordance with CMMC requirements.
Inside the Course
23 Lessons
Identification & Authentication (IA)
IA.L1-b.1.v Identification - Why Behind
IA.L1-b.1.v Identification - Evidence
IA.L1-b.1.vi Authentication - Why Behind
IA.L1-b.1.vi Authentication - Evidence
IA.L2-3.5.3 Multifactor Authentication - Why Behind
IA.L2-3.5.3 Multifactor Authentication - Evidence
IA.L2-3.5.4 Replay-Resistant Authentication - Why Behind
IA.L2-3.5.4 Replay-Resistant Authentication - Evidence
IA.L2-3.5.5 Identifier Reuse - Why Behind
IA.L2-3.5.5 Identifier Reuse - Evidence
IA.L2-3.5.6 Identifier Handling - Why Behind
IA.L2-3.5.6 Identifier Handling - Evidence
IA.L2-3.5.7 Password Complexity - Why Behind
IA.L2-3.5.7 Password Complexity - Evidence
IA.L2-3.5.8 Password Reuse - Why Behind
IA.L2-3.5.8 Password Reuse - Evidence
IA.L2-3.5.9 Temporary Passwords - Why Behind
IA.L2-3.5.9 Temporary Passwords - Evidence
IA.L2-3.5.10 Cryptographically - Protected Passwords - Why Behind
IA.L2-3.5.10 Cryptographically - Protected Passwords - Evidence
IA.L2-3.5.11 Obscure Feedback - Why Behind
IA.L2-3.5.11 Obscure Feedback - Evidence