The Center for Internet Security (CIS) controls are critical to protecting the confidentiality, integrity, and availability of sensitive data. This course will teach you the foundational knowledge required to understand how the CIS security controls are designed and implemented.
Security controls are the measures needed to protect systems and data from unauthorized access, disclosure, modification, and destruction. Without strong security controls, organizations run the risk of losing their critical information assets. The Center for Internet Security has developed 18 critical controls to help security practitioners secure data, maintain privacy, and assist in compliance with regulatory governance. In this course, Security Controls: CIS Controls, you’ll learn to implement these controls to ensure confidentiality, integrity, and availability of organizational systems and data. First, you’ll explore why the CIS controls were created and the benefits and advantages for implementing the CIS controls. You’ll also be able to describe the concepts, purpose, and types of CIS controls. Next, you’ll discover how the CIS controls are mapped to other regulatory and compliance frameworks. Finally, you’ll learn the process of implementing the CIS controls, implementation groups, and benchmarks. When you’re finished with this course, you’ll have the skills and knowledge of the CIS security controls needed to implement strong security measures and protect organizational systems and data.
Security controls are the measures needed to protect systems and data from unauthorized access, disclosure, modification, and destruction. Without strong security controls, organizations run the risk of losing their critical information assets. The Center for Internet Security has developed 18 critical controls to help security practitioners secure data, maintain privacy, and assist in compliance with regulatory governance. In this course, Security Controls: CIS Controls, you’ll learn to implement these controls to ensure confidentiality, integrity, and availability of organizational systems and data. First, you’ll explore why the CIS controls were created and the benefits and advantages for implementing the CIS controls. You’ll also be able to describe the concepts, purpose, and types of CIS controls. Next, you’ll discover how the CIS controls are mapped to other regulatory and compliance frameworks. Finally, you’ll learn the process of implementing the CIS controls, implementation groups, and benchmarks. When you’re finished with this course, you’ll have the skills and knowledge of the CIS security controls needed to implement strong security measures and protect organizational systems and data.