YoVDO

CIS Critical Security Control 10: Malware Defenses

Offered By: Cybrary

Tags

Malware Analysis Courses NIST Cybersecurity Framework Courses

Course Description

Overview

These security controls can be combined with frameworks, like NIST SP 800-37 (The NIST Risk Management Framework-RMF) to provide organizations with defense-in-depth best practices.

This course will help prepare students for industry certifications around the CIS Security Controls. You will see an overview of each control, map the controls to the NIST Cybersecurity Framework, and gain hands-on practice in secure, scenario-based lab environments.

Prerequisites

This course is designed for IT security professionals who want to expand their knowledge and skills in the area of development and implementation of security controls. Prerequisites include an existing knowledge of networking and knowledge of their organization’s security requirements.

Course Goals

By the end of this course, students should be able to:

  • Explain the concept of security controls
  • Enumerate the eighteen (18) areas of critical security controls
  • Implement technical security controls related to these areas

Syllabus

  • Course Overview and Introduction to the Critical CIS Controls
    • About This Course
    • Course Overview and Instructor Introduction
    • What is the Center for Internet Security?
    • What are Controls, Functions, and Safeguards?
    • Overview of the Critical CIS Controls
  • Malware Defenses
    • Why is this Control Critical?
    • Deploy and Maintain Anti-Malware Software
    • Disable Autorun and Autoplay for Removable Media
  • CIS 18 Course Review and What's Next
    • What's Next?
    • Course Review

Taught by

Corey Holzer

Related Courses

Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera
Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax
Android Malware Analysis - From Zero to Hero
Udemy
How to Create and Embed Malware (2-in-1 Course)
Udemy