BEGIN:VCALENDAR
VERSION:2.0
PRODID:NCyTE Center Calendar Creator
METHOD:PUBLISH
BEGIN:VEVENT
DTSTAMP:20251119T083558
DTSTART:20251206T080000
DTEND:20251206T120000
SUMMARY:Using AI to Build CMMC Custom Tools and Assignments
DESCRIPTION:<p style="text-align: center;"></p><p align="center"><strong>December 6, 2025</strong></p><p align="center"><strong>10 am CST - 2:00 pm CST | Virtual</strong></p><h2 style="text-align: center;"><a href="	https://ncytecenter.wildapricot.org/event-6443350 " target="_blank" rel="noopener">REGISTER TO ATTEND</a></h2><h3 style="text-align: center;"><a href="https://whatcom.prod-as.govaccess.org/home/showpublisheddocument/578/638991381496370000" target="_blank" rel="noopener">Download Flyer</a></h3><p>his highly interactive, hands-on workshop guides cybersecurity educators through the process of using artificial intelligence to design, build, and implement custom teaching tools aligned with the Cybersecurity Maturity Model Certification (CMMC) and NIST SP 800-171. Participants will work directly with AI-assisted development techniques to create practical, web-based instructional tools that can be deployed immediately in their own cybersecurity courses.</p><p>Throughout the session, attendees will design and build&nbsp;<strong>CMMC-aligned artifacts</strong>, including:</p><ul>    <li><strong>Asset Inventory &amp; Categorization Database</strong>&nbsp;– A dynamic, web-based tool to track, classify, and label organizational assets.</li>    <li><strong>Access Control Matrix</strong>&nbsp;– A clear, customizable framework for mapping user roles, permissions, and least-privilege requirements.</li>    <li><strong>System Maintenance Planner</strong>&nbsp;– A structured interface for documenting system updates, logging maintenance activities, and aligning with operational procedures.</li>    <li><strong>Configuration Management Plan Tool</strong>&nbsp;– A customizable template and online interface for teaching baseline configurations, change control, and documentation practices.</li>    <li><strong>Security Assessment Report Generator</strong>&nbsp;– A streamlined report builder that teaches students how to summarize findings, identify gaps, evaluate risks, and propose corrective actions.</li></ul><p>In addition, participants will learn how to use AI to&nbsp;<strong>generate realistic organizational case studies</strong>, including fictional companies, networks, roles, systems, data flows, and business processes. These custom-built scenarios will serve as the foundation for assignments, labs, and deliverables aligned with CMMC domains and practices.</p><p><strong>What Participants Will Learn</strong></p><ul data-start="2017" data-end="2556">    <li>How to use AI models to rapidly develop instructional resources for CMMC Domains 1–17.</li>    <li>How to build interactive&nbsp;<strong>HTML5, JavaScript, and CSS-based tools</strong>&nbsp;using AI guidance.</li>    <li>Methods for creating&nbsp;<strong>scenario-based assignments</strong>, security documentation, and assessment tasks using AI assistance.</li>    <li>Techniques for designing&nbsp;<strong>hands-on learning experiences</strong>&nbsp;that help students understand compliance, governance, and security documentation.</li>    <li>Best practices for evaluating AI-generated outputs and adapting them for classroom use.</li></ul><p><strong>Who Should Attend</strong></p><p>Cybersecurity instructors, program coordinators, CTE faculty, and trainers seeking practical, ready-to-use CMMC teaching materials. No programming expertise is required—AI-guided development will support all participants.</p><p><strong>Outcome</strong><br>By the end of the workshop, each participant will leave with a set of&nbsp;<strong>fully customized, AI-generated CMMC teaching tools</strong>, downloadable artifacts, and classroom-ready assignments built specifically for their institution’s cybersecurity curriculum.</p><p>&nbsp;</p>
X-ALT-DESC;FMTTYPE=text/html:<p style="text-align: center;"></p><p align="center"><strong>December 6, 2025</strong></p><p align="center"><strong>10 am CST - 2:00 pm CST | Virtual</strong></p><h2 style="text-align: center;"><a href="	https://ncytecenter.wildapricot.org/event-6443350 " target="_blank" rel="noopener">REGISTER TO ATTEND</a></h2><h3 style="text-align: center;"><a href="https://whatcom.prod-as.govaccess.org/home/showpublisheddocument/578/638991381496370000" target="_blank" rel="noopener">Download Flyer</a></h3><p>his highly interactive, hands-on workshop guides cybersecurity educators through the process of using artificial intelligence to design, build, and implement custom teaching tools aligned with the Cybersecurity Maturity Model Certification (CMMC) and NIST SP 800-171. Participants will work directly with AI-assisted development techniques to create practical, web-based instructional tools that can be deployed immediately in their own cybersecurity courses.</p><p>Throughout the session, attendees will design and build&nbsp;<strong>CMMC-aligned artifacts</strong>, including:</p><ul>    <li><strong>Asset Inventory &amp; Categorization Database</strong>&nbsp;– A dynamic, web-based tool to track, classify, and label organizational assets.</li>    <li><strong>Access Control Matrix</strong>&nbsp;– A clear, customizable framework for mapping user roles, permissions, and least-privilege requirements.</li>    <li><strong>System Maintenance Planner</strong>&nbsp;– A structured interface for documenting system updates, logging maintenance activities, and aligning with operational procedures.</li>    <li><strong>Configuration Management Plan Tool</strong>&nbsp;– A customizable template and online interface for teaching baseline configurations, change control, and documentation practices.</li>    <li><strong>Security Assessment Report Generator</strong>&nbsp;– A streamlined report builder that teaches students how to summarize findings, identify gaps, evaluate risks, and propose corrective actions.</li></ul><p>In addition, participants will learn how to use AI to&nbsp;<strong>generate realistic organizational case studies</strong>, including fictional companies, networks, roles, systems, data flows, and business processes. These custom-built scenarios will serve as the foundation for assignments, labs, and deliverables aligned with CMMC domains and practices.</p><p><strong>What Participants Will Learn</strong></p><ul data-start="2017" data-end="2556">    <li>How to use AI models to rapidly develop instructional resources for CMMC Domains 1–17.</li>    <li>How to build interactive&nbsp;<strong>HTML5, JavaScript, and CSS-based tools</strong>&nbsp;using AI guidance.</li>    <li>Methods for creating&nbsp;<strong>scenario-based assignments</strong>, security documentation, and assessment tasks using AI assistance.</li>    <li>Techniques for designing&nbsp;<strong>hands-on learning experiences</strong>&nbsp;that help students understand compliance, governance, and security documentation.</li>    <li>Best practices for evaluating AI-generated outputs and adapting them for classroom use.</li></ul><p><strong>Who Should Attend</strong></p><p>Cybersecurity instructors, program coordinators, CTE faculty, and trainers seeking practical, ready-to-use CMMC teaching materials. No programming expertise is required—AI-guided development will support all participants.</p><p><strong>Outcome</strong><br>By the end of the workshop, each participant will leave with a set of&nbsp;<strong>fully customized, AI-generated CMMC teaching tools</strong>, downloadable artifacts, and classroom-ready assignments built specifically for their institution’s cybersecurity curriculum.</p><p>&nbsp;</p>
LOCATION:Virtual\, 
CLASS:PUBLIC
END:VEVENT
END:VCALENDAR
