Free

CIS Top 20 Critical Security Controls

CIS Controls are a prioritized set of actions that protect your organization and data from known cyber-attack vectors. Our CIS Top 20 Critical Security Controls Course aligns to CIS v7.1. Learn about each control, why it’s important to your organization, and how you can help your team implement these best practices.
8
24
M
Time
intermediate
difficulty
10
ceu/cpe

Course Content

Control 2 Mapping to the NIST Cybersecurity Framework

4m

Control 2: Inventory and Control of Software Assets
Control 3 Mapping to the Cybersecurity Framework

4m

Control 3: Continuous Vulnerability Management
Control 4 Mapping to the NIST Cybersecurity Framework

5m

Control 4: Controlled Use of Administrative Privileges
Control 5 Mapping to the NIST Cybersecurity Framework

3m

Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
Control 6 Mapping to the NIST Cybersecurity Framework

4m

Control 6: Maintenance, Monitoring, and Analysis of Audit Logs
Control 7 Mapping to the NIST Cybersecurity Framework

5m

Control 7: Email and Web Browser Protections
Control 8 Mapping to the NIST CSF

4m

Control 8: Malware Defenses
Control 9 Mapping to the NIST Cybersecurity Framework

2m

Control 9: Limitation and Control of Network Ports, Protocols, and Services
Control 10 Mapping to the NIST Cybersecurity Framework

2m

Control 10: Data Recovery Capabilities
Control 11 Mapping to the Cybersecurity Framework

2m

Control 11: Secure Configuration for Network Devices, Such as Firewalls, Routers, and Switches
Control 14 Mapping to the NIST Cybersecurity Framework

4m

Control 14: Controlled Access Based on the Need to Know
Control 16 Mapping to the NIST Cybersecurity Framework

7m

Control 16: Account Monitoring and Control
Control 17 Mapping to the NIST Cybersecurity Framework

7m

Control 17: Implement a Security Awareness and Training Program
Control 18 Mapping to the NIST Cybersecurity Framework

4m

Control 18: Application Software Security
Control 19 Mapping to the NIST Cybersecurity Framework

4m

Control 19: Incident Response and Management
Control 20 Mapping to the NIST Cybersecurity Framework

4m

Control 20: Penetration Tests and Red Team Exercises
Run a Network Scan Using Nmap Lab Part 1

8m

Control 1: Inventory and Control of Hardware Assets
Analyze and Classify Malware Lab

8m

Control 8: Malware Defenses
Data Backup and Recovery Lab

5m

Control 10: Data Recovery Capabilities
Firewall Setup and Configuration Lab

2m

Control 11: Secure Configuration for Network Devices, Such as Firewalls, Routers, and Switches
Performing an Initial Attack Analysis Lab

2m

Control 19: Incident Response and Management
Run a Network Scan Using Nmap Lab Part 2

2m

Control 1: Inventory and Control of Hardware Assets
Course Description

These security controls can be combined with frameworks, like NIST SP 800-37 (The NIST Risk Management Framework-RMF) to provide organizations with defense-in-depth best practices.

This course may help prepare students for industry certifications around the CIS Security Controls.The course will cover an overview of each control, map the controls to the NIST Cybersecurity Framework, and students will gain hands-on practice through labs in this course.

Prerequisites

Students should be familiar with common IT and cybersecurity terminology. It is recommended that students have 1-2 years of experience working in the cybersecurity industry.

Course Goals

By the end of this course, students should be able to:

  • Understand what the 20 CIS security controls are
  • * Understand how each control maps to the NIST Cybersecurity Framework

    This course is part of a Career Path:
    No items found.

    Instructed by

    No items found.
    Provider
    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a CIS Top 20 Critical Security Controls Certificate of Completion