CIS Critical Security Control 1: Inventory and Control of Enterprise Assets
Offered By: Cybrary
Course Description
Overview
These security controls can be combined with frameworks, like NIST SP 800-37 (The NIST Risk Management Framework-RMF) to provide organizations with defense-in-depth best practices.
This course will help prepare students for industry certifications around the CIS Security Controls. You will see an overview of each control and gain hands-on practice in secure, scenario-based lab environments.
Prerequisites
This course is designed for IT security professionals who want to expand their knowledge and skills in the area of development and implementation of security controls. Prerequisites include an existing knowledge of networking and knowledge of their organization’s security requirements.
Course Goals
By the end of this course, students should be able to:
- Explain the concept of security controls
- Enumerate the eighteen (18) areas of critical security controls
- Implement technical security controls related to these areas
Syllabus
- Course Overview and Introduction to the Critical CIS Controls
- About This Course
- Course Overview and Instructor Introduction
- What is the Center for Internet Security?
- What are Controls, Functions, and Safeguards?
- Overview of the Critical CIS Controls
- Inventory and Control of Enterprise Assets
- Why is This Control Critical?
- Establish & Maintain an Enterprise Asset Inventory
- Utilize an Active Discovery Tool
- Handling Rogue Devices
- CIS 18 Course Review and What's Next
- What's Next?
- Course Review
Taught by
Corey Holzer
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network