Security Controls: CIS Controls
Offered By: Pluralsight
Course Description
Overview
The Center for Internet Security (CIS) controls are critical to protecting the confidentiality, integrity, and availability of sensitive data. This course will teach you the foundational knowledge required to understand how the CIS security controls are designed and implemented.
Security controls are the measures needed to protect systems and data from unauthorized access, disclosure, modification, and destruction. Without strong security controls, organizations run the risk of losing their critical information assets. The Center for Internet Security has developed 18 critical controls to help security practitioners secure data, maintain privacy, and assist in compliance with regulatory governance. In this course, Security Controls: CIS Controls, you’ll learn to implement these controls to ensure confidentiality, integrity, and availability of organizational systems and data. First, you’ll explore why the CIS controls were created and the benefits and advantages for implementing the CIS controls. You’ll also be able to describe the concepts, purpose, and types of CIS controls. Next, you’ll discover how the CIS controls are mapped to other regulatory and compliance frameworks. Finally, you’ll learn the process of implementing the CIS controls, implementation groups, and benchmarks. When you’re finished with this course, you’ll have the skills and knowledge of the CIS security controls needed to implement strong security measures and protect organizational systems and data.
Security controls are the measures needed to protect systems and data from unauthorized access, disclosure, modification, and destruction. Without strong security controls, organizations run the risk of losing their critical information assets. The Center for Internet Security has developed 18 critical controls to help security practitioners secure data, maintain privacy, and assist in compliance with regulatory governance. In this course, Security Controls: CIS Controls, you’ll learn to implement these controls to ensure confidentiality, integrity, and availability of organizational systems and data. First, you’ll explore why the CIS controls were created and the benefits and advantages for implementing the CIS controls. You’ll also be able to describe the concepts, purpose, and types of CIS controls. Next, you’ll discover how the CIS controls are mapped to other regulatory and compliance frameworks. Finally, you’ll learn the process of implementing the CIS controls, implementation groups, and benchmarks. When you’re finished with this course, you’ll have the skills and knowledge of the CIS security controls needed to implement strong security measures and protect organizational systems and data.
Syllabus
- Course Overview 1min
- Understanding the CIS Controls 18mins
- Planning Your CIS Implementation 18mins
- Implementing the CIS Controls 21mins
- Maintaining and Assessing the CIS Controls 13mins
- Case Study: Implementing the CIS Controls at Globomantics 19mins
Taught by
Bobby Rogers
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network