CIS Critical Security Control 2: Inventory and Control of Software Assets
Welcome to our course series on CIS Top 18 Critical Security Controls v8. In this course covering control 2: Inventory and Control of Software Assets, you’ll demonstrate how to collect software inventory across the network. Plus, get hands-on training as you allowlist authorized software and scripts.
Course Description
These security controls can be combined with frameworks, like NIST SP 800-37 (The NIST Risk Management Framework-RMF) to provide organizations with defense-in-depth best practices.
This course will help prepare students for industry certifications around the CIS Security Controls. You will see an overview of each control, map the controls to the NIST Cybersecurity Framework, and gain hands-on practice in secure, scenario-based lab environments.
This course is designed for IT security professionals who want to expand their knowledge and skills in the area of development and implementation of security controls. Prerequisites include an existing knowledge of networking and knowledge of their organization’s security requirements.
By the end of this course, students should be able to:
Course Goals
By the end of this course, students should be able to:
Explain the concept of security controls
Enumerate the eighteen (18) areas of critical security controls
Module 1: Course Overview and Introduction to the Critical CIS Controls
Module 2: Inventory and Control of Software Assets
Module 3: CIS 18 Course Review and What’s Next
User Reviews
Be the first to review “CIS Critical Security Control 2: Inventory and Control of Software Assets”
You must be logged in to post a review.

There are no reviews yet.