We may earn an affiliate commission when you visit our partners.
Bobby Rogers

The Center for Internet Security (CIS) controls are critical to protecting the confidentiality, integrity, and availability of sensitive data. This course will teach you the foundational knowledge required to understand how the CIS security controls are designed and implemented.

Read more

The Center for Internet Security (CIS) controls are critical to protecting the confidentiality, integrity, and availability of sensitive data. This course will teach you the foundational knowledge required to understand how the CIS security controls are designed and implemented.

Security controls are the measures needed to protect systems and data from unauthorized access, disclosure, modification, and destruction. Without strong security controls, organizations run the risk of losing their critical information assets. The Center for Internet Security has developed 18 critical controls to help security practitioners secure data, maintain privacy, and assist in compliance with regulatory governance.

In this course, Security Controls: CIS Controls, you’ll learn to implement these controls to ensure confidentiality, integrity, and availability of organizational systems and data.

First, you’ll explore why the CIS controls were created and the benefits and advantages for implementing the CIS controls. You’ll also be able to describe the concepts, purpose, and types of CIS controls.

Next, you’ll discover how the CIS controls are mapped to other regulatory and compliance frameworks.

Finally, you’ll learn the process of implementing the CIS controls, implementation groups, and benchmarks.

When you’re finished with this course, you’ll have the skills and knowledge of the CIS security controls needed to implement strong security measures and protect organizational systems and data.

Enroll now

What's inside

Syllabus

Course Overview
Understanding the CIS Controls
Planning Your CIS Implementation
Implementing the CIS Controls
Read more
Maintaining and Assessing the CIS Controls
Case Study: Implementing the CIS Controls at Globomantics

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Examines Center for Internet Security (CIS) controls, which are standard in information security
Helps learners implement CIS controls to secure data and comply with regulations
Taught by Bobby Rogers, who is recognized for their work in information security
Introduces foundational knowledge of CIS security controls and their implementation
Requires learners to have some background in information security and data protection
May require additional resources and materials for implementation of CIS controls

Save this course

Save Security Controls: CIS Controls to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Security Controls: CIS Controls with these activities:
Organize Course Resources
Organize your notes, assignments, and resources to enhance your ability to access and review course materials.
Show steps
  • Create a filing system or use a digital note-taking app
  • Categorize and label your notes and materials
  • Review your materials regularly to reinforce your understanding
Review Network Security Fundamentals
Refresh your knowledge of network security concepts to enhance your understanding of the CIS Controls.
Browse courses on network security
Show steps
  • Review course materials or online resources
  • Complete practice questions or simulations
  • Attend a refresher workshop or webinar
Practice Security Auditing Techniques
Refresh your security auditing skills to effectively evaluate the implementation of the CIS Controls.
Browse courses on Security Auditing
Show steps
  • Review auditing standards and best practices
  • Practice performing security audits in a test environment
  • Identify vulnerabilities and recommend corrective actions
Three other activities
Expand to see all activities and additional details
Show all six activities
Read 'CIS Controls: A Practical Guide'
Gain a deeper understanding of the CIS Controls by reading a comprehensive book on the topic.
Show steps
  • Purchase or borrow the book
  • Read the book thoroughly
  • Take notes and highlight important concepts
Build a cheat sheet
Solidify your understanding of the CIS Controls by creating a quick-reference cheat sheet to use during the course.
Show steps
  • Review the CIS Controls documentation
  • Identify key concepts and definitions
  • Summarize the information in your own words
  • Organize the cheat sheet into logical sections
CIS Controls Assessment Exercises
Test your knowledge of the CIS Controls by completing a series of assessment exercises.
Browse courses on Security Assessment
Show steps
  • Find online assessment resources or purchase a practice book
  • Complete the assessment exercises
  • Review your results and identify areas for improvement

Career center

Learners who complete Security Controls: CIS Controls will develop knowledge and skills that may be useful to these careers:
Security Operations Center Analyst
As a Security Operations Center Analyst, you'll monitor and analyze security events to identify and respond to threats. The Security Controls: CIS Controls course can provide a strong foundation for this role by teaching you about the CIS controls, which are widely recognized as best practices for IT security. Understanding these controls will enable you to effectively detect and respond to security incidents.
Security Manager
In your role as a Security Manager, you'll oversee the development and implementation of an organization's security program. The Security Controls: CIS Controls course can provide valuable knowledge for this role by teaching you about the CIS controls, which are essential for protecting IT systems and data. By understanding these controls, you'll be able to effectively manage and mitigate security risks.
IT Security Manager
As an IT Security Manager, you'll oversee the development and implementation of an organization's IT security program. The Security Controls: CIS Controls course can provide valuable knowledge for this role by teaching you about the CIS controls, which are essential for protecting IT systems and data. By understanding these controls, you'll be able to effectively manage and mitigate security risks.
Information Security Officer
In your role as an Information Security Officer, you'll be responsible for overseeing the development and implementation of an organization's information security program. The Security Controls: CIS Controls course can provide valuable knowledge for this role by teaching you about the CIS controls, which are essential for protecting IT systems and data. By understanding these controls, you'll be able to effectively manage and mitigate security risks.
Security Engineer
As a Security Engineer, you'll design, implement, and maintain security controls to protect an organization's IT systems and data. The Security Controls: CIS Controls course can provide a strong foundation for this role by teaching you about the CIS controls, which are industry-recognized best practices for securing IT systems. By understanding these controls, you'll be able to effectively develop and implement security solutions.
Security Analyst
As a Security Analyst, you'll monitor and analyze security events to identify and respond to threats. The Security Controls: CIS Controls course can provide a strong foundation for this role by teaching you about the CIS controls, which are widely recognized as best practices for IT security. Understanding these controls will enable you to effectively detect and respond to security incidents.
Security Consultant
In your role as a Security Consultant, you'll help organizations improve their security posture and mitigate risks. The Security Controls: CIS Controls course can provide valuable knowledge for this role by teaching you about the CIS controls, which are essential for protecting IT systems and data. By understanding these controls, you'll be able to effectively assess and improve an organization's security posture.
Cybersecurity Risk Analyst
As a Cybersecurity Risk Analyst, you'll assess and manage cybersecurity risks for an organization. The Security Controls: CIS Controls course can provide a strong foundation for this role by teaching you about the CIS controls, which are essential for protecting IT systems and data. By understanding these controls, you'll be able to effectively identify and mitigate cybersecurity risks.
Penetration Tester
As a Penetration Tester, you'll evaluate the security of an organization's IT systems by simulating cyber attacks. The Security Controls: CIS Controls course can provide a strong foundation for this role by teaching you about the CIS controls, which are essential for protecting IT systems and data. By understanding these controls, you'll be able to effectively identify and exploit vulnerabilities in an organization's security posture.
Security Architect
In your role as a Security Architect, you'll design and implement security solutions to protect an organization's IT systems and data. The Security Controls: CIS Controls course can provide valuable knowledge for this role by teaching you about the CIS controls, which are essential for securing IT systems. By understanding these controls, you'll be able to effectively design and implement robust security solutions.
Information Security Analyst
In your role as an Information Security Analyst, you'll be responsible for protecting an organization's IT systems and data from cyber threats. The Security Controls: CIS Controls course can provide a strong foundation for this role by teaching you about the CIS controls, which are industry-recognized best practices for securing IT systems. By understanding these controls, you'll be able to develop and implement effective security measures to protect an organization's data and systems.
Network Security Engineer
In your role as a Network Security Engineer, you'll design, implement, and maintain an organization's network security infrastructure. The Security Controls: CIS Controls course can provide valuable knowledge for this role by teaching you about the CIS controls, which are essential for securing network systems. By understanding these controls, you'll be able to effectively manage and mitigate network security risks.
Systems Engineer
As a Systems Engineer, you'll design, implement, and maintain IT systems. The Security Controls: CIS Controls course may be useful in building a foundation for this role by teaching you about the CIS controls, which are widely recognized as best practices for IT security. Understanding these controls will enable you to effectively design and implement secure IT systems.
IT Auditor
As an IT Auditor, you'll evaluate an organization's IT systems and controls to ensure they are operating effectively and securely. The Security Controls: CIS Controls course may be helpful in building a foundation for this role by teaching you about the CIS controls, which are widely recognized as best practices for IT security. Understanding these controls will enable you to effectively assess and audit an organization's IT infrastructure.
Compliance Auditor
As a Compliance Auditor, you'll help ensure that organizations adhere to regulatory standards and internal policies. The Security Controls: CIS Controls course may be useful in building a foundation for this role by teaching you about the CIS controls, which are critical to protecting sensitive data and maintaining compliance. Understanding these controls will enable you to effectively assess and audit an organization's security posture.

Reading list

We've selected 17 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Controls: CIS Controls.
Provides a practical guide for implementing security controls in any organization. It valuable resource for anyone looking to get started with security controls implementation.
Provides a comprehensive handbook on security controls, including the CIS controls. It valuable resource for anyone looking to learn more about security controls or to implement them in their organization.
Provides a comprehensive overview of security controls for industrial control systems, including the CIS controls. It valuable resource for anyone looking to implement security controls in an industrial control systems environment.
Provides a comprehensive overview of security controls for telecommunications networks, including the CIS controls. It valuable resource for anyone looking to implement security controls in a telecommunications network environment.
Provides a comprehensive overview of security controls for wireless networks, including the CIS controls. It valuable resource for anyone looking to implement security controls in a wireless network environment.
Provides a comprehensive overview of security controls for embedded systems, including the CIS controls. It valuable resource for anyone looking to implement security controls in an embedded systems environment.
Classic in the field of information security. It provides a broad overview of security principles, and explains how to apply them to a variety of real-world situations. This foundational text for learning about information security in general.
Provides a comprehensive overview of security controls for critical infrastructure, including the CIS controls. It valuable resource for anyone looking to implement security controls in a critical infrastructure environment.
Provides a comprehensive overview of security engineering principles. It explains how to design and build secure systems, and how to assess the security of existing systems. This technical resource that practitioners working in security engineering can use as a reference.
Provides a comprehensive overview of cryptography and network security. It explains the principles of cryptography, and how they are used to secure networks. This book foundational text for learning about cryptography and network security.
Provides a practical guide to implementing ISO 27001, the international standard for information security management systems. It explains the requirements of the standard, and how to meet them. This book is helpful for those who are responsible for implementing or maintaining an ISO 27001-compliant information security management system.
Provides a practical guide to information security risk management. It explains how to identify, assess, and manage information security risks. This useful resource for those who are responsible for managing information security risks.
Provides a practical guide to malware analysis. It explains how to analyze malware, and how to identify the threats it poses. This useful resource for those who are interested in learning about malware analysis.
Provides a practical guide to reverse engineering. It explains how to reverse engineer software, and how to identify the vulnerabilities it contains. This useful resource for those who are interested in learning about reverse engineering.
Provides a fascinating overview of the history of cryptography. It explains how cryptography has been used to protect secrets throughout history, and how it is used today. This great book for anyone who is interested in learning about the history of cryptography.
Provides a concise overview of cryptography. It explains the basic principles of cryptography, and how they are used to secure data. This great book for anyone who wants to learn about the basics of cryptography.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser