Security Controls: CIS Controls
Offered By: Pluralsight
Course Description
Overview
The Center for Internet Security (CIS) controls are critical to protecting the confidentiality, integrity, and availability of sensitive data. This course will teach you the foundational knowledge required to understand how the CIS security controls are designed and implemented.
Security controls are the measures needed to protect systems and data from unauthorized access, disclosure, modification, and destruction. Without strong security controls, organizations run the risk of losing their critical information assets. The Center for Internet Security has developed 18 critical controls to help security practitioners secure data, maintain privacy, and assist in compliance with regulatory governance. In this course, Security Controls: CIS Controls, you’ll learn to implement these controls to ensure confidentiality, integrity, and availability of organizational systems and data. First, you’ll explore why the CIS controls were created and the benefits and advantages for implementing the CIS controls. You’ll also be able to describe the concepts, purpose, and types of CIS controls. Next, you’ll discover how the CIS controls are mapped to other regulatory and compliance frameworks. Finally, you’ll learn the process of implementing the CIS controls, implementation groups, and benchmarks. When you’re finished with this course, you’ll have the skills and knowledge of the CIS security controls needed to implement strong security measures and protect organizational systems and data.
Security controls are the measures needed to protect systems and data from unauthorized access, disclosure, modification, and destruction. Without strong security controls, organizations run the risk of losing their critical information assets. The Center for Internet Security has developed 18 critical controls to help security practitioners secure data, maintain privacy, and assist in compliance with regulatory governance. In this course, Security Controls: CIS Controls, you’ll learn to implement these controls to ensure confidentiality, integrity, and availability of organizational systems and data. First, you’ll explore why the CIS controls were created and the benefits and advantages for implementing the CIS controls. You’ll also be able to describe the concepts, purpose, and types of CIS controls. Next, you’ll discover how the CIS controls are mapped to other regulatory and compliance frameworks. Finally, you’ll learn the process of implementing the CIS controls, implementation groups, and benchmarks. When you’re finished with this course, you’ll have the skills and knowledge of the CIS security controls needed to implement strong security measures and protect organizational systems and data.
Syllabus
- Course Overview 1min
- Understanding the CIS Controls 18mins
- Planning Your CIS Implementation 18mins
- Implementing the CIS Controls 21mins
- Maintaining and Assessing the CIS Controls 13mins
- Case Study: Implementing the CIS Controls at Globomantics 19mins
Taught by
Bobby Rogers
Related Courses
Cryptography IIStanford University via Coursera Microsoft Enterprise Mobility Suite
Microsoft via edX Social Media - What No One has Told You about Privacy
openHPI Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX Health Professional Teaching Skills – Level 3 - Professionalism
University of Toronto via edX