Free
CIS Top 20 Critical Security Controls
CIS Controls are a prioritized set of actions that protect your organization and data from known cyber-attack vectors. Our CIS Top 20 Critical Security Controls Course aligns to CIS v7.1. Learn about each control, why it’s important to your organization, and how you can help your team implement these best practices.

9
H
54
M
Time
intermediate
difficulty
10
ceu/cpe
Course Content
Conclusion
Conclusion
What SME's Need to Know About CIS
What Small and Medium Enterprises (SME) Need to Know about the CIS Controls
Control 20 Mapping to the NIST Cybersecurity Framework
Control 20: Penetration Tests and Red Team Exercises
Overview of Control 20
Control 20: Penetration Tests and Red Team Exercises
Performing Incident Response in a Windows Environment
Control 19: Incident Response and Management
Performing Incident Response in a Windows Environment Lab
Control 19: Incident Response and Management
Performing an Initial Attack Analysis
Control 19: Incident Response and Management
Performing an Initial Attack Analysis Lab
Control 19: Incident Response and Management
Control 19 Mapping to the NIST Cybersecurity Framework
Control 19: Incident Response and Management
Overview of Control 19
Control 19: Incident Response and Management
Control 18 Mapping to the NIST Cybersecurity Framework
Control 18: Application Software Security
Overview of Control 18
Control 18: Application Software Security
Control 17 Mapping to the NIST Cybersecurity Framework
Control 17: Implement a Security Awareness and Training Program
Overview of Control 17
Control 17: Implement a Security Awareness and Training Program
Control 16 Mapping to the NIST Cybersecurity Framework
Control 16: Account Monitoring and Control
Overview of Control 16
Control 16: Account Monitoring and Control
Control 15 Mapping to the NIST Cybersecurity Framework
Control 15: Wireless Access Control
Overview of Control 15
Control 15: Wireless Access Control
Control 14 Mapping to the NIST Cybersecurity Framework
Control 14: Controlled Access Based on the Need to Know
Overview of Control 14
Control 14: Controlled Access Based on the Need to Know
Control 13 Mapping to the NIST Cybersecurity Framework
Control 13: Data Protection
Overview of Control 13
Control 13: Data Protection
Control 12 Mapping to the NIST Cybersecurity Framework
Control 12: Boundary Defense
Overview of Control 12
Control 12: Boundary Defense
Firewall Setup and Configuration
Control 11: Secure Configuration for Network Devices, Such as Firewalls, Routers, and Switches
Course Description
These security controls can be combined with frameworks, like NIST SP 800-37 (The NIST Risk Management Framework-RMF) to provide organizations with defense-in-depth best practices.
This course may help prepare students for industry certifications around the CIS Security Controls.The course will cover an overview of each control, map the controls to the NIST Cybersecurity Framework, and students will gain hands-on practice through labs in this course.
## Prerequisites
Students should be familiar with common IT and cybersecurity terminology. It is recommended that students have 1-2 years of experience working in the cybersecurity industry.
## Course Goals
By the end of this course, students should be able to: