Course Overview
Explore techniques to ensure the integrity and security of your systems and information, focusing on threat detection, protection, and response as mandated by CMMC.
Inside the Course
15 Lessons
System and Information Integrity (SI)
SI.L1-b.1.xii Flaw Remediation: Why Behind
SI.L1-b.1.xii Flaw Remediation Evidence
SI.L1-b.1.xiii Malicious Code Protection Why Behind
SI.L1-b.1.xiii Malicious Code Protection Evidence
SI.L1-b.1.xiv Update Malicious Code Protection Why Behind
SI.L1-b.1.xiv Update Malicious Code Protection Evidence
SI.L1-b.1.xv System & File Scanning Why Behind
SI.L1-b.1.xv System & File Scanning Evidence
SI.L2-3.14.3 Security Alert & Adversaries Why Behind
SI.L2-3.14.3 Security Alert & Adversaries Evidence
SI.L2-3.14.6 Monitor Communications for Attacks Why Behind
SI.L2-3.14.6 Monitor Communications for Attacks Evidence
SI.L2-3.14.7 Identify Unauthorized Use Why Behind
SI.L2-3.14.7 Identify Unauthorized Use Evidence