Course curriculum

    1. Overview of Center for Internet Security (CIS)

    2. 7 Key Principles of CIS

    1. CIS Critical Controls

    2. CIS Critical Controls version 7 vs version 8

    3. CIS Critical Controls brief descriptions

    1. CIS Control 1: Inventory and Control of Hardware Assets

    2. CIS Control 2: Inventory and Control of Software Assets

    3. CIS Control 3: Continuous Vulnerability Management

    4. CIS Control 4: Controlled Use of Administrative Privileges

    5. CIS Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers

    6. CIS Control 6: Maintenance, Monitoring and Analysis of Audit Logs

    1. CIS Control 7: Email and Web Browser Protections

    2. CIS Control 8: Malware Defenses

    3. CIS Control 9: Limitation and Control of Network Ports, Protocols, and Services

    4. CIS Control 10: Data Recovery Capabilities

    5. CIS Control 11: Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches

    6. CIS Control 12: Boundary Defense

    7. CIS Control 13: Data Protection

    8. CIS Control 14: Controlled Access Based on the Need to Know

    9. CIS Control 15: Wireless Access Control

    10. CIS Control 16: Account Monitoring and Control

    1. CIS Control 17: Implement a Security Awareness and Training Program

    2. CIS Control 18: Application Software Security

    3. CIS Control 19: Incident Response and Management

    4. CIS Control 20: Penetration Tests and Red Team Exercises

    1. CIS Controls : Use Cases and Cost Justification

    2. CIS Critical Security Controls - Overview and Implementation Resources

About this course

  • Free
  • 34 lessons
  • 0 hours of video content