Free
CIS Top 20 Critical Security Controls
CIS Controls are a prioritized set of actions that protect your organization and data from known cyber-attack vectors. Our CIS Top 20 Critical Security Controls Course aligns to CIS v7.1. Learn about each control, why it’s important to your organization, and how you can help your team implement these best practices.
8
H
24
M
Time
intermediate
difficulty
10
ceu/cpe
Course Content
Firewall Setup and Configuration Lab
Control 11: Secure Configuration for Network Devices, Such as Firewalls, Routers, and Switches
Control 11 Mapping to the Cybersecurity Framework
Control 11: Secure Configuration for Network Devices, Such as Firewalls, Routers, and Switches
Overview of Control 11
Control 11: Secure Configuration for Network Devices, Such as Firewalls, Routers, and Switches
Data Backup and Recovery
Control 10: Data Recovery Capabilities
Data Backup and Recovery Lab
Control 10: Data Recovery Capabilities
Control 10 Mapping to the NIST Cybersecurity Framework
Control 10: Data Recovery Capabilities
Overview of Control 10
Control 10: Data Recovery Capabilities
Control 9 Mapping to the NIST Cybersecurity Framework
Control 9: Limitation and Control of Network Ports, Protocols, and Services
Overview of Control 9
Control 9: Limitation and Control of Network Ports, Protocols, and Services
Analyze and Classify Malware Lab
Control 8: Malware Defenses
Control 8 Mapping to the NIST CSF
Control 8: Malware Defenses
Overview of Control 8
Control 8: Malware Defenses
Control 7 Mapping to the NIST Cybersecurity Framework
Control 7: Email and Web Browser Protections
Overview of Control 7
Control 7: Email and Web Browser Protections
Control 6 Mapping to the NIST Cybersecurity Framework
Control 6: Maintenance, Monitoring, and Analysis of Audit Logs
Overview of Control 6
Control 6: Maintenance, Monitoring, and Analysis of Audit Logs
Control 5 Mapping to the NIST Cybersecurity Framework
Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
Overview of Control 5
Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
Control 4 Mapping to the NIST Cybersecurity Framework
Control 4: Controlled Use of Administrative Privileges
Overview of Control 4
Control 4: Controlled Use of Administrative Privileges
Control 3 Mapping to the Cybersecurity Framework
Control 3: Continuous Vulnerability Management
Overview of Control 3
Control 3: Continuous Vulnerability Management
Control 2 Mapping to the NIST Cybersecurity Framework
Control 2: Inventory and Control of Software Assets
Overview of Control 2
Control 2: Inventory and Control of Software Assets
Run a Network Scan Using Nmap
Control 1: Inventory and Control of Hardware Assets
Course Description
These security controls can be combined with frameworks, like NIST SP 800-37 (The NIST Risk Management Framework-RMF) to provide organizations with defense-in-depth best practices.
This course may help prepare students for industry certifications around the CIS Security Controls.The course will cover an overview of each control, map the controls to the NIST Cybersecurity Framework, and students will gain hands-on practice through labs in this course.