Free
CIS Critical Security Control 2: Inventory and Control of Software Assets
Welcome to our course series on CIS Top 18 Critical Security Controls v8. In this course covering control 2: Inventory and Control of Software Assets, you'll demonstrate how to collect software inventory across the network. Plus, get hands-on training as you allowlist authorized software and scripts.
2
H
24
M
Time
intermediate
difficulty
3
ceu/cpe
Course Content
Why is This Control Critical?
Inventory and Control of Software Assets
Utilize Automated Software Inventory Tools
Inventory and Control of Software Assets
Allowlist Authorized Software
Inventory and Control of Software Assets
GPO Policy Software Management
Inventory and Control of Software Assets
Course Description
These security controls can be combined with frameworks, like NIST SP 800-37 (The NIST Risk Management Framework-RMF) to provide organizations with defense-in-depth best practices.
This course will help prepare students for industry certifications around the CIS Security Controls. You will see an overview of each control, map the controls to the NIST Cybersecurity Framework, and gain hands-on practice in secure, scenario-based lab environments.