CIS Top 20 Critical Security Controls

0
Language

Level

Beginner

Access

Paid

Certificate

Paid

CIS Controls are a prioritized set of actions that protect your organization and data from known cyber-attack vectors. Our CIS Top 20 Critical Security Controls Course aligns to CIS v7.1. Learn about each control, why it’s important to your organization, and how you can help your team implement these best practices.

Add your review

Course Description

These security controls can be combined with frameworks, like NIST SP 800-37 (The NIST Risk Management Framework-RMF) to provide organizations with defense-in-depth best practices.

This course may help prepare students for industry certifications around the CIS Security Controls.The course will cover an overview of each control, map the controls to the NIST Cybersecurity Framework, and students will gain hands-on practice through labs in this course.

Students should be familiar with common IT and cybersecurity terminology. It is recommended that students have 1-2 years of experience working in the cybersecurity industry.

By the end of this course, students should be able to:

Course Goals

By the end of this course, students should be able to:

Understand what the 20 CIS security controls are

Understand how each control maps to the NIST Cybersecurity Framework

Module 1: Introduction

Module 2: Control 1: Inventory and Control of Hardware Assets

Module 3: Control 2: Inventory and Control of Software Assets

Module 4: Control 3: Continuous Vulnerability Management

Module 5: Control 4: Controlled Use of Administrative Privileges

Module 6: Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

Module 7: Control 6: Maintenance, Monitoring, and Analysis of Audit Logs

Module 8: Control 7: Email and Web Browser Protections

Module 9: Control 8: Malware Defenses

Module 10: Control 9: Limitation and Control of Network Ports, Protocols, and Services

Module 11: Control 10: Data Recovery Capabilities

Module 12: Control 11: Secure Configuration for Network Devices, Such as Firewalls, Routers, and Switches

Module 13: Control 12: Boundary Defense

Module 14: Control 13: Data Protection

Module 15: Control 14: Controlled Access Based on the Need to Know

Module 16: Control 15: Wireless Access Control

Module 17: Control 16: Account Monitoring and Control

Module 18: Control 17: Implement a Security Awareness and Training Program

Module 19: Control 18: Application Software Security

Module 20: Control 19: Incident Response and Management

Module 21: Control 20: Penetration Tests and Red Team Exercises

Module 22: What Small and Medium Enterprises (SME) Need to Know about the CIS Controls

Module 23: Conclusion

Module 24: Course Assessment

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “CIS Top 20 Critical Security Controls”

×

    Your Email (required)

    Report this page
    CIS Top 20 Critical Security Controls
    CIS Top 20 Critical Security Controls
    LiveTalent.org
    Logo
    LiveTalent.org
    Privacy Overview

    This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.