Security Controls: CIS Controls
The Center for Internet Security (CIS) controls are critical to protecting the confidentiality, integrity, and availability of sensitive data. This course will teach you the foundational knowledge required to understand how the CIS security controls are designed and implemented.
Security controls are the measures needed to protect systems and data from unauthorized access, disclosure, modification, and destruction. Without strong security controls, organizations run the risk of losing their critical information assets. The Center for Internet Security has developed 18 critical controls to help security practitioners secure data, maintain privacy, and assist in compliance with regulatory governance. In this course, Security Controls: CIS Controls, you’ll learn to implement these controls to ensure confidentiality, integrity, and availability of organizational systems and data. First, you’ll explore why the CIS controls were created and the benefits and advantages for implementing the CIS controls. You’ll also be able to describe the concepts, purpose, and types of CIS controls. Next, you’ll discover how the CIS controls are mapped to other regulatory and compliance frameworks. Finally, you’ll learn the process of implementing the CIS controls, implementation groups, and benchmarks. When you’re finished with this course, you’ll have the skills and knowledge of the CIS security controls needed to implement strong security measures and protect organizational systems and data.
Author Name: Bobby Rogers
Author Description:
Bobby E. Rogers is an information security engineer working as a contractor for Department of Defense agencies, helping to secure, certify, and accredit their information systems. His duties include information system security engineering, risk management, and certification and accreditation efforts. He retired after 21 years in the U.S. Air Force, serving as a network security engineer and instructor, and has secured networks all over the world. Bobby has a master’s degree in information assura… more
Table of Contents
- Course Overview
1min - Understanding the CIS Controls
18mins - Planning Your CIS Implementation
18mins - Implementing the CIS Controls
21mins - Maintaining and Assessing the CIS Controls
13mins - Case Study: Implementing the CIS Controls at Globomantics
19mins
There are no reviews yet.