Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CIS Critical Security Controls - Introduction
Training Overview
Description of Training
Video Overview (1:23)
CIS Security Controls
Course Introduction (1:23)
CIS Control 1: Inventory and Control of Enterprise Assets (5:20)
CIS Control 2: Inventory and Control of Software Assets (7:48)
CIS Control 3: Data Protection (8:49)
CIS Control 4: Secure Configuration of Enterprise Assets and Software (6:56)
CIS Control 5: Account Management (9:47)
CIS Control 6: Access Control Management (5:13)
CIS Control 7: Continuous Vulnerability Management (5:57)
CIS Control 8: Audit Log Management (6:17)
CIS Control 9: Email and Web Browser Protections (6:53)
CIS Control 10: 18 Introduction (0:20)
CIS Control 11: Malware Defenses (5:10)
CIS Control 12: Data Recovery (3:55)
CIS Control 13: Network Infrastructure Management (5:02)
CIS Control 14: Network Monitoring and Defense (3:32)
CIS Control 15: Security Awareness and Skills Training (5:22)
CIS Control 16: Service Provider Management (4:40)
CIS Control 17: Application Software Security (9:24)
CIS Control 18: Incident Response Management (8:33)
CIS Control 19: Penetration Testing (5:05)
Audio Version of the Training
Audio Download
CIS Control 7: Continuous Vulnerability Management
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock