Become a Certified Digital Leader Designed for: IT managers and business managers Consultants Project managers Key take aways from this leadership course (non-technical): Be comfortable with digital trends and technologies Leverage digital for your business Organise digital and manage digital transformation successfully Module 1 - Digital concepts Digital building blocks Digital lifecycle Big Data strategy Module 2 - Digital strategy Strategy Golden triangle of digital transformation Opportunity analysis Module 3 - Digital marketing Advertising Funnels E-commerce Module 4 - Digital economy Competitive landscape Influencers Legislation Module 5 - Digital finance Digital investments Defining budgets for digital ROI of digital marketing Module 6 - Information risks Information security concepts AI risks Privacy and Intellectual Property Module 7 - Organising digital Organisational design Iterative approaches Module 8 - Leading the digital workforce Digital mindset Robots & human workforce Industry 4.0 Module 9 - Leading Digital Transformation programmes Product development & Innovation Programme management Organisational change Case studies 3 business cases
Duration 1 Days 6 CPD hours This course is intended for This course is intended for individuals who desire to influence, develop, and/or implement a business ethics program in an organization. Overview Upon successful completion of this course, students will be able to foster a successful company culture and increase profitability by implementing a program of good business ethics. In this course, students will grow in their understanding of business ethics, their impact on all business levels and how all who interact with the company influence the development of a company business ethic. Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives What is Ethics? What is Business Ethics 10 Benefits of Managing Ethics Case Study Implementing Ethics in the Workplace Benefits Guidelines for Managing Ethics in the Workplace Roles and Responsibilities Employer / Employee Rights Privacy Policies Harassment Issues Technology Business and Social Responsibilities Identifying Types of Responsibilities Case Study Handling Conflicting Social and Business Responsibilities Case Study Ethical Decisions The Basics Balancing Personal and Organizational Ethics Common Dilemmas Making Ethical Decisions Overcoming Obstacles Whistle Blowing Criteria and Risk The Process When You Should 'Blow the Whistle Managerial Ethics Ethical Management Identifying the Characteristics Ensuring Ethical Behavior Unethical Behavior Recognize and Identify Preventing Addressing Interventions Ethics in Business (I) Organization Basics Addressing the Needs Ethical Principles Ethics in Business (II) Ethical Safeguards Developing a Code of Ethics Performing an Internal Ethics Audit Upholding the Ethics Program Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations Additional course details: Nexus Humans Business Ethics training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Ethics course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Keeping Yourself in Mind: An ACT-informed programme for people supporting a family member with JHD We are pleased to invite you to our virtual course for parents and family carers of people living with Juvenile Huntington’s disease. The course will be run by Sarah Gunn, a clinical psychologist and researcher at the University of Leicester, and will be based on the principles of Acceptance and Commitment Therapy. Acceptance and Commitment Therapy is a therapeutic approach which focuses on learning to manage difficult thoughts and feelings, and to live a life which feels valuable and meaningful despite the struggles we encounter. This is an opportunity to explore the difficulties that can be associated with caring for a person with JHD (for you and within the family), to identify the values that matter most to you, and for you to think about how to move towards a more rich and valued life than you may have now. This is an eight-week course running from Wednesday 7 February to Wednesday 27 March 2024. The sessions will be on a Wednesday afternoon 1-2.30pm. Here is a very brief session outline: Week 1: Introductions: To ACT, to the programme, and to each other Week 2: Impacts of Juvenile Huntington’s on the “carer”* and wider family Week 3: Psychological wellbeing when supporting a person with Juvenile Huntington’s Week 4: Coping and adjustment: Living with, not battling against Week 5: What matters to you: Finding your values Week 6: Moving forward: Taking steps to align with your values Week 7: Living a valued life alongside Huntington’s: Plans and coping strategies Week 8: Reflection and ending: What’s next? *Note: Some people don’t like this term, so here we’re using it in quote marks. During the course, we will discuss which term would be preferred by the people attending. For more information on what information we collect and how we use it when booking onto one of our events, please see our privacy policy on our website.
Duration 1 Days 6 CPD hours This course is intended for This course is designed for business leaders and decision makers, including C-level executives, project and product managers, HR leaders, Marketing and Sales leaders, and technical sales consultants, who have a vested interest in the representation of ethical values in technology solutions. Other individuals who want to know more about data ethics are also candidates for this course. This course is also designed to assist learners in preparing for the CertNexus DEBIZ⢠(Exam DEB-110) credential. The power of extracting value from data utilizing Artificial Intelligence, Data Science and Machine Learning exposes the learning differences between humans and machines. Humans can apply ethical principles throughout the decision-making process to avoid discrimination, societal harm, and marginalization to maintain and even enhance acceptable norms. Machines make decisions autonomously. So how do we train them to apply ethical principles as they learn from decisions they make? This course provides business professionals and consumers of technology core concepts of ethical principles, how they can be applied to emerging data driven technologies and the impact to an organization which ignores ethical use of technology. Introduction to Data Ethics Defining Data Ethics The Case for Data Ethics Identifying Ethical Issues Improving Ethical Data Practices Ethical Principles Ethical Frameworks Data Privacy Accountability Transparency and Explainability Human-Centered Values and Fairness Inclusive Growth, Sustainable Development, and Well-Being Applying Ethical Principles to Emerging Technology Improving Ethical Data Practices Sources of Ethical Risk Mitigating Bias Mitigating Discrimination Safety and Security Mitigating Negative Outputs Data Surveillance Assessing Risk Ethical Risks in sharing data Applying professional critical judgement Business Considerations Data Legislation Impact of Social and Behavioral Effects Trustworthiness Impact on Business Reputation Organizational Values and the Data Value Chain Building a Data Ethics Culture/Code of Ethics Balancing organizational goals with Ethical Practice Additional course details: Nexus Humans CertNexus Data Ethics for Business Professionals (DEBIZ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Data Ethics for Business Professionals (DEBIZ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course does not have any technical knowledge prerequisites for the learners, besides being proficient in using a computer and the Internet. IT and/or AI knowledge is a benefit but not a hard requirement. Given the rapid development of AI and the broad range of its applications in everyday life, it is crucial for anyone to attend this course to update their digital skills in an ever-changing world. It is expected that all learners have registered for a free account of OpenAI ChatGPT at https://chat.openai.com. Overview Discover how AI relates to other 4th industrial revolution technologies Learn about AI, ML, and associated cognitive services Overview of AI development frameworks, tools and services Evaluate the OpenAI ChatGPT4 / ChatGPT3.5 model features in more detail The core aim of this ?AI for beginners? course is to introduce its audience to Artificial Intelligence (AI) and Machine Learning (ML) technologies and allow them to understand the practical applications of AI in their everyday personal and professional life. Moreover, the course aims to provide a handful of demos and hands-on exercises to allow the learners to familiarize themselves with usage scenarios of OpenAI ChatGPT and other Generative AI (GenAI) models. The content of this course has been created primarily by using the OpenAI ChatGPT model. AI theoretical concepts. Introduction to AI, ML, and associated cognitive services (Computer vision, Natural language processing, Speech analysis, Decision making). How AI relates to other 4th industrial revolution technologies (cloud computing, edge computing, internet of things, blockchain, metaverse, robotics, quantum computing). AI model classification by utilizing mind maps and the distinctive role of Gen AI models. Introduction to the OpenAI ChatGPT model and alternative generative AI models. Familiarization with the basics of the ChatGPT interface (https://chat.openai.com). Talking about Responsible AI: Security, privacy, compliance, copyright, legal challenges, and ethical implications. AI practical applications Overview of AI development frameworks, tools and services. AI aggregators review. Hand-picked AI tool demos: a.Workplace productivity and the case of Microsoft 365 Copilot. b.The content creation industry. Create text, code, images, audio and video with Gen AI. c.Redefining the education sector with AI-powered learning. Evaluate the OpenAI ChatGPT4 / ChatGPT3.5 model features in more detail: a.Prompting and plugin demos. b.Code interpreter demos. Closing words. Discussion with an AI model on the future of AI. Additional course details: Nexus Humans AI for beginners training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AI for beginners course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety. Overview After completing this course, students will be able to: Identify and reduce human errors that put organizations at risk for a cyber-attacks. Define Ransomware, Phishing, and Data Breaches to understand the differences. Identify the motives of hackers. Assess how data breaches occur. Develop a plan on how to protect accounts and privacy. Create a strong and secure password. Work in a secure manner while using remote Wi-Fi access. Safely use Virtual Private Networks (VPN). Identify vulnerabilities in home networks to keep them secure. Identity different social engineering techniques e.g. phishing, vishing. Detect social engineering attempts and prevent potential breaches. Prevent hackers from accessing a Mobile phone. Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats. INTRODUCTION TO CYBERSECURITY Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks. ACCOUNTS & CREDENTIALS SECURITY One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords. REMOTE SECURITY: WI-FI & VPN Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments. SOCIAL ENGINEERING How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches. MOBILE SECURITY Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more. Additional course details: Nexus Humans Cybersecurity Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cybersecurity Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Technical Leaders Overview What is BlockchainHow does Blockchain workTypes of BlockchainsHow is Blockchain different from what we have todayWhat are use cases for BlockchainWhat does a Blockchain app look likeHow do I design a Blockchain appHow do I develop a Blockchain appHow do I test a Blockchain app This instructor-led 3 day Blockchain Architecture training is for technical leaders who need to make decisions about architecture, environment, and development platforms. What is Blockchain? A record keeping system Trust Decentralization Trustless environment How does Blockchain work? Announcements Blocks Nodes Chaining Verification Consensus Scalability Privacy Crypto Hashing Digital Fingerprinting PoW vs PoS Types of Blockchains Public vs Private Open vs closed Smart Contracts Blockchain as History Tokens / Coins Gas How is Blockchain different from what we have today? Decentralized Peer-to-peer architecture Software vs Firmware Database vs Blockchain Distributed database or other technology? Data Sovereignty Group Consensus What are Use Cases for Blockchain? Use Case Examples Currency Banking Services Voting Medical Records Supply Chain / Value Chain Content Distribution Verification of Software Updates (cars, planes, trains, etc) Law Enforcement Title and Ownership Records Social Media and Online Credibility Fractional asset ownership Cable Television billing High fault tolerance DDoS-proof Public or Private Blockchain? Who are the participants? What does a Blockchain app look like? DApp Resembles typical full stack web application Any internal state changes and all transactions are written to the blockchain Node.js IDE Public Blockchain visibility Private Blockchain solutions Oracles How do I design a Blockchain app? What does this solution need to let users do? Will the proposed solution reduce or remove the problems and pain points currently felt by users? What should this solution prevent users from doing? Do you need a solution ready for heavy use on day 1? Is your solution idea enhanced by the use of Blockchain? Does the use of Blockchain create a better end-user experience? If so, how? Has your business developed custom software solutions before? What level of support are you going to need? How big is the developer community? Does your vision of the future align with the project or platform's vision of the future? Does the platform aim to make new and significant contributions to the development space, or is it an efficiency / cost play? Should the solution be a public or private Blockchain? Should the solution be an open or closed Blockchain? Create a plan for contract updates and changes! Hybrid solutions Monetary exchanges? How do I develop a Blockchain app? AGILE approach pre-release Define guiding principles up front Software vs Firmware Announcements, not transactions! Classes, not contracts Link contracts to share functions Use calling contracts to keep contract address the same Hyperledger vs Ethereum CONSIDER No of Users * Avg No of Transactions (state changes) per User Should a Blockless solution be applied? Performance Security Anonymity Security Monolithic vs Modular Sandwich complexity model How do I test a Blockchain app? Recommend 5x to 10x traditional application testing time Security Networks
Technology and innovation and its profound impact on financial operations Technology adoption indeed comes with risks, particularly around data security and privacy. As CFOs, we must ensure robust cybersecurity measures and adhere to strict data protection regulations. It requires ongoing investment in secure systems, staff training, and proactive monitoring to mitigate risks and protect sensitive financial information. Change management is also crucial. The adoption of new technologies requires proper planning, training, and cultural adjustments. As CFOs, we need to foster a culture that embraces innovation and continuous learning. Clear communication about the benefits and objectives of technology adoption is essential to gain buy-in and drive successful implementation. Fantastic insights! Now, let’s discuss the future. What emerging technologies do you foresee shaping the future of finance functions? One area that holds immense potential is blockchain technology. Its decentralised and transparent nature has the potential to streamline financial transactions, enhance auditability, and revolutionize supply chain finance. We’re closely monitoring blockchain’s development and exploring pilot projects to leverage its benefits. I agree, blockchain is a game-changer. Additionally, as the internet of things (IoT) expands, we anticipate new opportunities and challenges. CFOs will need to adapt to the influx of real-time data from interconnected devices, leveraging this information to optimize financial processes, enhance risk management, and improve operational efficiencies. Before we wrap up, any final thoughts or advice for our CFO audience? Embrace technology and view it as an opportunity rather than a threat. Invest in understanding the technological landscape and its implications for finance. Stay curious, adapt, and be open to change. Technology will continue to evolve, and as CFOs, we must evolve with it. Absolutely. Collaboration is key. Engage with IT teams, industry peers, and external experts to stay informed about the latest technological advancements. By fostering partnerships and sharing knowledge, we can collectively navigate the ever-changing technology landscape and drive innovation within our organisations. https://www.fdcapital.co.uk/podcast/technology-and-innovation-and-its-profound-impact-on-financial-operations/ Tags Online Events Things To Do Online Online Conferences Online Science & Tech Conferences #technology #innovation #financial #impact #operations
Duration 3 Days 18 CPD hours This course is intended for The target audience for the SRE Practitioner course are professionals including: Anyone focused on large-scale service scalability and reliability Anyone interested in modern IT leadership and organizational change approaches Business Managers Business Stakeholders Change Agents Consultants DevOps Practitioners IT Directors IT Managers IT Team Leaders Product Owners Scrum Masters Software Engineers Site Reliability Engineers System Integrators Tool Providers Overview After completing this course, students will have learned: Practical view of how to successfully implement a flourishing SRE culture in your organization. The underlying principles of SRE and an understanding of what it is not in terms of anti-patterns, and how you become aware of them to avoid them. The organizational impact of introducing SRE. Acing the art of SLIs and SLOs in a distributed ecosystem and extending the usage of Error Budgets beyond the normal to innovate and avoid risks. Building security and resilience by design in a distributed, zero-trust environment. How do you implement full stack observability, distributed tracing and bring about an Observability-driven development culture? Curating data using AI to move from reactive to proactive and predictive incident management. Also, how you use DataOps to build clean data lineage. Why is Platform Engineering so important in building consistency and predictability of SRE culture? Implementing practical Chaos Engineering. Major incident response responsibilities for a SRE based on incident command framework, and examples of anatomy of unmanaged incidents. Perspective of why SRE can be considered as the purest implementation of DevOps SRE Execution model Understanding the SRE role and understanding why reliability is everyone's problem. SRE success story learnings This course introduces a range of practices for advancing service reliability engineering through a mixture of automation, organizational ways of working and business alignment. Tailored for those focused on large-scale service scalability and reliability. SRE Anti-patterns Rebranding Ops or DevOps or Dev as SRE Users notice an issue before you do Measuring until my Edge False positives are worse than no alerts Configuration management trap for snowflakes The Dogpile: Mob incident response Point fixing Production Readiness Gatekeeper Fail-Safe really? SLO is a Proxy for Customer Happiness Define SLIs that meaningfully measure the reliability of a service from a user?s perspective Defining System boundaries in a distributed ecosystem for defining correct SLIs Use error budgets to help your team have better discussions and make better data-driven decisions Overall, Reliability is only as good as the weakest link on your service graph Error thresholds when 3rd party services are used Building Secure and Reliable Systems SRE and their role in Building Secure and Reliable systems Design for Changing Architecture Fault tolerant Design Design for Security Design for Resiliency Design for Scalability Design for Performance Design for Reliability Ensuring Data Security and Privacy Full-Stack Observability Modern Apps are Complex & Unpredictable Slow is the new down Pillars of Observability Implementing Synthetic and End user monitoring Observability driven development Distributed Tracing What happens to Monitoring? Instrumenting using Libraries an Agents Platform Engineering and AIOPs Taking a Platform Centric View solves Organizational scalability challenges such as fragmentation, inconsistency and unpredictability. How do you use AIOps to improve Resiliency How can DataOps help you in the journey A simple recipe to implement AIOps Indicative measurement of AIOps SRE & Incident Response Management SRE Key Responsibilities towards incident response DevOps & SRE and ITIL OODA and SRE Incident Response Closed Loop Remediation and the Advantages Swarming ? Food for Thought AI/ML for better incident management Chaos Engineering Navigating Complexity Chaos Engineering Defined Quick Facts about Chaos Engineering Chaos Monkey Origin Story Who is adopting Chaos Engineering Myths of Chaos Chaos Engineering Experiments GameDay Exercises Security Chaos Engineering Chaos Engineering Resources SRE is the Purest form of DevOps Key Principles of SRE SREs help increase Reliability across the product spectrum Metrics for Success Selection of Target areas SRE Execution Model Culture and Behavioral Skills are key SRE Case study Post-class assignments/exercises Non-abstract Large Scale Design (after Day 1) Engineering Instrumentation- Instrumenting Gremlin (after Day 2)
Duration 4.375 Days 26.25 CPD hours This course is intended for This course provides a jump start on learning material that relates to the CMMC program, and to the planned Certified Professional (CP) certification in particular. It discusses the CMMC program, the current CMMC Model, and other CMMC materials as they exist today. The course may be of interest to individuals who wish to pursue the CMMC-CP certification when it is released. It may also be useful to stakeholders in organizations who will be involved in CMMC assessments, and who wish to gain a general understanding of the program and its requirements for their business planning purposes Overview In this course, you will examine the current CMMC model (Version 1.02), framework, context, and application within the DoD, as well as the expectations and requirements that will be imposed upon organizations that do business with the DoD. It will also help you to identify threats to cybersecurity and privacy within an IoT ecosystem and implement appropriate countermeasures. You will gain the skills to: · Identify risks within the defense supply chain and the established standards for managing them. · Describe how the CMMC model ensures compliance with federal acquisition regulations. · Identify responsibilities of the CMMC Certified Professional, including appropriate ethics and behavior. · Identify regulated information and establish the Certification and Assessment scope boundaries for evaluating the systems that protect that regulated information. · Evaluate OSC readiness and determine the objective evidence you intend to present to the assessor. · Use the NIST 800-171A and CMMC Assessment Guide to assess objective evidence for processes and practices. · Implement and evaluate practices required to meet CMMC maturity level 1. · Implement and evaluate processes and practices required to meet CMMC maturity level 2. · Implement and evaluate processes and practices required to meet CMMC maturity level 3. · Identify processes and practices required to meet CMMC maturity levels 4 and 5. · Work through the logistics of a CMMC assessment, including planning for and conducting the assessment, as well as any follow-up processes, such as remediation and adjudication. The Cybersecurity Maturity Model Certification (CMMC), managed by the CMMC Accreditation Body (CMMC-AB), is a program through which an organization's cybersecurity program is measured by their initial and ongoing compliance with applicable cybersecurity practices as well as their integration of corresponding policies and plans into their overall business operations. By Fiscal Year 2026, all organizations providing products or services to the United States Department of Defense (DoD) must obtain at least a Maturity Level 1 certification under this program. Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses Against Threats Ensuring Compliance through CMMC Topic A: Identify Limitations of Self-Certification Topic B: Identify Benefits of CMMC Topic C: Describe the CMMC Model Architecture Performing the General Responsibilities of a CMMC CP Topic A: Identify Responsibilities of the CMMC CP Topic B: Demonstrate Appropriate Ethics and Behavior Identifying and Scoping Regulated Information Topic A: Identify Regulated Information Topic B: Establish the Certification and Assessment Scope Boundaries Initiating the Assessment Process Topic A: Evaluate Readiness Topic B: Determine Objective Evidence Assessing Objective Evidence Topic A: Assess the Practices Using the CMMC Assessment Guides Topic B: Assess the Processes Using the CMMC Assessment Guide Level 3 Implementing and Evaluating CMMC Level 1 TTopic A: Maturity Level 1 Domains and Practices Topic B: Determine Scope Boundaries at Maturity Level 1 Topic C: Perform a Maturity Level 1 Gap Analysis Topic D: Perform a Maturity Level 1 Evidence Validation Implementing and Evaluating CMMC Levels 2 and 3 Topic A: Process Maturity Requirements for CMMC Levels 2 and 3 Topic B: Maturity Level 2 Practices Topic C: Maturity Level 3 Practices Identifying CMMC Levels 4 and 5 Topic A: Maturity Level 4 Processes and Practices Topic B: Maturity Level 5 Processes and Practices Working Through a CMMC Assessment Topic A: Define the Assessment Logistics Topic B: Resolve Assessment Related Issues Appendix A: Additional Documentation the CP Should Study