Lessons

  • Overview
  • Lesson 1: The Need for Continuous Monitoring at the DoD [2:51]
  • Lesson 2: What is Comply to Connect? [2:06]
  • Lesson 3: How to Implement Comply to Connect [3:54]
  • Knowledge Check
  • Post-Course Survey

Please sign up for the course to view lesson content

The Defense Department created Comply to Connect (C2C) as a way to secure its growing array of network endpoints. It is a formal framework for validating new devices, evaluating their compliance with DoD security policies, and continuously monitoring these assets to ensure they remain in security compliance. It also provides automated remediation of device issues, reducing the impact of maintaining cyber hygiene on cybersecurity administrators.

This course examines the challenges to secure device adoption and connection at DoD, as well as how C2C helps defense agencies overcome those challenges. It also walks through a workflow of four phases to implement the C2C framework and explores solutions that can help automate C2C.

This course was informed by Dean Hullings, Senior Solutions Strategist at Forescout. To learn more about securing DoD connections, check out these additional resources: