Course Description
The Cybersecurity Maturity Model Certification (CMMC) program, managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is designed to validate defense contractors’ compliance with the cybersecurity practices required by their contracts. Once rulemaking has concluded and CMMC 2.0 has been fully implemented, all organizations providing products or services to the United States Department of Defense (DoD) must achieve the CMMC level required in the desired contract.
Certified CMMC Assessor (CCA) Bootcamp Dec 2025Certified CMMC Assessor (CCA) Bootcamp
Topic A: Protect Controlled Unclassified Information
Topic B: Utilize the CMMC Source Documents CMMC Certified Assessor (CCA) Course Content:
Lesson 2: Being an AssessorTopic A: Identify Assessment Roles and ResponsibilitiesTopic B: Establish an Assessor MindsetTopic C: Determine the OSA/OSC's Cybersecurity
Topic A: Identify Assessment Roles and Responsibilities
Topic B: Establish an Assessor Mindset
Topic C: Determine the OSA/OSC's Cybersecurity
Lesson 3: Working Through an AssessmentTopic A: Identify Assessment Flow and Milestone EventsTopic B: Prepare to Work with the OSA/OSCTopic C: Formalize the PlanTopic D: Assess the EvidenceTopic E: Handle Non-Conformity IssuesTopic F: Finalize the Assessment
Topic A: Identify Assessment Flow and Milestone Events
Topic B: Prepare to Work with the OSA/OSC
Topic C: Formalize the Plan
Topic D: Assess the Evidence
Topic E: Handle Non-Conformity Issues
Topic F: Finalize the Assessment
Lesson 4: Validating the Scope of a CMMC AssessmentTopic A: Define Scope FundamentalsTopic B: Categorize the AssetsTopic C: Determine the OSA/OSC ContextTopic D: Define ESPsTopic E: Validate the Assessment Scope
Topic A: Define Scope Fundamentals
Topic B: Categorize the Assets
Topic C: Determine the OSA/OSC Context
Topic D: Define ESPs
Topic E: Validate the Assessment Scope
Lesson 5: Assessing the AC PracticesTopic A: Evaluate the AC PracticesTopic B: Identify AC Connections and Considerations
Topic A: Evaluate the AC Practices
Topic B: Identify AC Connections and Considerations
Lesson 6: Assessing the AT PracticesTopic A: Evaluate the AT PracticesTopic B: Identify AT Connections and Considerations
Topic A: Evaluate the AT Practices
Topic B: Identify AT Connections and Considerations
Lesson 7: Assessing the AU PracticesTopic A: Evaluate the AU PracticesTopic B: Identify AU Connections and Considerations
Topic A: Evaluate the AU Practices
Topic B: Identify AU Connections and Considerations
Lesson 8: Assessing the CA PracticesTopic A: Evaluate the CA PracticesTopic B: Identify CA Connections and Considerations
Topic A: Evaluate the CA Practices
Topic B: Identify CA Connections and Considerations
Lesson 9: Assessing the CM PracticesTopic A: Evaluate the CM PracticesTopic B: Identify CM Connections and Considerations
Topic A: Evaluate the CM Practices
Topic B: Identify CM Connections and Considerations
Lesson 10: Assessing the IA PracticesTopic A: Evaluate the IA PracticesTopic B: Identify IA Connections and Considerations
Topic A: Evaluate the IA Practices
Topic B: Identify IA Connections and Considerations
Related Certificates
Earning a Saint Louis University Workforce Center certificate allows you to enhance your career options by networking with peers and establishing valuable industry contacts.
ISACA Professional Certificate
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Large Language Models Foundations
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Machine Learning for Cybersecurity Operations
Artificial intelligence (AI) and machine learning (ML) are revolutionizing the cybersecurity industry. The emergence of ML as a tool for...
See Details