Logical Operations Releases Approved Certified CMMC Assessor (CCA) Courseware
February 6, 2023 Rochester, N.Y.

Anyone doing business with or is a subcontractor indirectly doing business with the Department of Defense (DoD) is undoubtedly familiar with The Cybersecurity Maturity Model Certification (CMMC). But if you have questions around how to become CMMC compliant, you are not alone. People are scrambling to find CMMC compliance training, but people don’t need to look any further than Logical Operations. Logical Operations is a one-stop shop for CMMC-approved training.

Newly Approved Certified CMMC Assessor (CCA) Courseware:

We at Logical Operations are thrilled to announce our most recent approval of Certified CMMC Assessor (CCA) curriculum as Cyber AB Authorized Training Material (CATM). Logical Operations’ Certified CMMC Professional (CCP) material has already been approved, which means that Logical Operations now provides CMMC Licensed Training Providers (LTPs) with a full offering to support the CMMC certification training path.

How to Become a Licensed Training Provider (LTP):

Established professional training organizations are invited to pursue LTP status by completing the enrollment process found here. This includes completing a streamlined, online application, submitting the program fee and references, completing a background check, and signing the LTP Agreement and Code of Conduct.

Once you’ve completed the process, you will be able to offer both the CCP and CCA training.

What Is The Cybersecurity Maturity Model Certification (CMMC)?

The Cybersecurity Maturity Model Certification is the evolution of the Department of Defense’s (DoD) strategy to safeguard the Defense Industrial Base (DIB) from cyber threats, both foreign and domestic. There are over 350,000 organizations who are part of the DIB who participate in bidding on and winning contracts from the DoD. In the near future, all 350,000 DIB organizations plus subcontractors will have to switch from a very loose “self-attestation” model on their cybersecurity practices, to a much more formal third-party assessment model. This is going to require massive amounts of training, both authorized and unauthorized, for hundreds of thousands of IT departments. Training for these companies will range from:

  • Teaching what CMMC is.
  • Instruction on IT security best practices to ensure their systems will meet the standards necessary to pass a CMMC Assessment.
  • Official CMMC Assessor preparation.

In short, this is a massive shift in the way the DIB organizations are managing their cybersecurity, and one of the only solutions is training.

What Does It Mean to Be a Certified CMMC Assessor (CCA)?

A Certified CMMC Assessor (CCA) who successfully completes all certification program requirements as outlined by the CAICO (the subsidiary of the CyberAB responsible for training and certification) will be authorized to work in an assessor capacity on Level 2 Assessments on behalf of a Certified Third-Party Assessor Organization (C3PAO).

Aside from the Certified Assessor track, both the CCP and CCA courses are also a great option for individuals in a variety of roles who will support DIB organizations in their CMMC preparation efforts.

A Word from One of Logical Operation’s Training Partners:

"Having delivered Logical Operations’ CCP content to nearly 300 students around the world, I can safely say they are very excited to take the CCA course and continue on their CMMC journey," said Jeffrey Crump, Principal Consultant at the CMMC Training Academy. Crump added, "Our students are immensely happy with the high-quality and meaningful structure of Logical Operations’ CMMC courseware."

A Word from Logical Operation’s Executive Vice President:

“We are excited to continue our support of the Cybersecurity Maturity Model Certification,” said James E. Varnham, FLPI, Executive Vice President, Global Sales & Marketing at Logical Operations. “Every organization’s cybersecurity program must start with strong cybersecurity practices, and Certified CMMC Assessor (CCA) applies a rigorous Assessment Process to ensure the relevant security controls have been effectively implemented.”