Course Overview
Explore methods to secure system and communication channels, preventing unauthorized access and data breaches as required by CMMC.
Inside the Course
33 Lessons
System & Communications Protection (SC)
SC.L1-b.1.x Boundary Protection - Why Behind
SC.L1-b.1.x Boundary Protection - Evidence
SC.L1-b.1.xi Public-Access System Separation - Why Behind
SC.L1-b.1.xi Public-Access System Separation - Evidence
SC.L2-3.13.2 Security Engineering - Why Behind
SC.L2-3.13.2 Security Engineering - Evidence
SC.L2-3.13.3 Role Separation - Why Behind
SC.L2-3.13.3 Role Separation - Evidence
SC.L2-3.13.4 Shared Resource Control - Why Behind
SC.L2-3.13.4 Shared Resource Control - Evidence
SC.L2-3.13.6 Network Communication by Exception - Why Behind
SC.L2-3.13.6 Network Communication by Exception - Evidence
SC.L2-3.13.7 Split Tunneling - Why Behind
SC.L2-3.13.7 Split Tunneling - Evidence
SC.L2-3.13.8 Data in Transit - Why Behind
SC.L2-3.13.8 Data in Transit - Evidence
SC.L2-3.13.9 Connections Termination - Why Behind
SC.L2-3.13.9 Connections Termination - Evidence
SC.L2-3.13.10 Key Management - Why Behind
SC.L2-3.13.10 Key Management - Evidence
SC.L2-3.13.11 CUI Encryption - Why Behind
SC.L2-3.13.11 CUI Encryption - Evidence
SC.L2-3.13.12 Collaborative Device Control - Why Behind
SC.L2-3.13.12 Collaborative Device Control - Evidence
SC.L2-3.13.13 Mobile Code - Why Behind
SC.L2-3.13.13 Mobile Code - Evidence
SC.L2-3.13.14 Voice over Internet Protocol - Why Behind
SC.L2-3.13.14 Voice over Internet Protocol - Evidence
SC.L2-3.13.15 Communications Authenticity - Why Behind
SC.L2-3.13.15 Communications Authenticity - Evidence
SC.L2-3.13.16 Data at Rest - Why Behind
SC.L2-3.13.16 Data at Rest - Evidence