Introduction to CIS Critical Security Controls

Learn how to implement CIS Critical Security Controls to safeguard systems, users, and data. This course introduces key cybersecurity best practices to help IT and cybersecurity professionals protect sensitive information and reduce risk across all environments.

4.5
β˜…β˜…β˜…β˜…β˜…
(100)
1,500 Students
2 Hours
Stage 4 - Advanced

Last update: Jan 2025

Audio Language: English

Subtitles/Captions: Yes

Type of Training: Online self-paced

Focus: Cyber Security Compliance Training Courses, Cyber Security Courses

Caption Language: English

Introduction to CIS Critical Security Controls

What You’ll Learn

This Introduction to CIS Critical Security Controls will teach you:

  • CIS Controls overview:
    Understand the purpose and structure of the 18 controls.
  • Control implementation:
    Learn how to apply controls across systems and networks.
  • Data protection:
    Explore best practices to secure sensitive information.
  • Access management:
    Manage user accounts and permissions effectively.
  • Malware defenses:
    Defend systems using industry-recommended practices.
  • Secure configurations:
    Harden devices and software to prevent cyber attacks.
  • Audit logging:
    Monitor and analyze activity logs to detect threats.
  • Incident response:
    Establish and manage plans for responding to security events.

Included in the Introduction to CIS

2 Hours of On-Demand Video

Access on Mobile

Certificate of Completion

Suitable for the Following Careers

IT Professional

Cybersecurity Professional

Information Security Analyst

Systems Administrator

Security Consultant

Compliance Officer

IT Manager

Computer Information Systems Specialist

Course Content

Training Overview

icon-yt Description of Training Preview
icon-yt Video Overview Preview

CIS Security Controls

icon-yt Course Introduction Preview
icon-yt CIS Control 1: Inventory and Control of Enterprise Assets Preview
icon-yt CIS Control 2: Inventory and Control of Software Assets Preview
icon-yt CIS Control 3: Data Protection Preview
icon-yt CIS Control 4: Secure Configuration of Enterprise Assets and Software Preview
icon-yt CIS Control 5: Account Management Preview
icon-yt CIS Control 6: Access Control Management Preview
icon-yt CIS Control 7: Continuous Vulnerability Management Preview
icon-yt CIS Control 8: Audit Log Management Preview
icon-yt CIS Control 9: Email and Web Browser Protections Preview
icon-yt CIS Control 10: 18 Introduction Preview
icon-yt CIS Control 11: Malware Defenses Preview
icon-yt CIS Control 12: Data Recovery Preview
icon-yt CIS Control 13: Network Infrastructure Management Preview
icon-yt CIS Control 14: Network Monitoring and Defense Preview
icon-yt CIS Control 15: Security Awareness and Skills Training Preview
icon-yt CIS Control 16: Service Provider Management Preview
icon-yt CIS Control 17: Application Software Security Preview
icon-yt CIS Control 18: Incident Response Management Preview
icon-yt CIS Control 19: Penetration Testing Preview

Audio Version of the Training

icon-yt Audio Download Preview

Requirements

Basic understanding of IT and cybersecurity concepts

A computer or device with internet access

Familiarity with computer hardware and operating systems

Interest in improving organizational security

Description of Introduction to CIS Critical Security Controls

Understanding how to protect systems, users, and data begins with the CIS Critical Security Controlsβ€”a practical framework trusted by cybersecurity professionals worldwide. This course offers a clear introduction to these 18 prioritized safeguards, showing you how each control addresses specific security issues faced by organizations today.

Through focused, task-based lessons, you’ll learn how to map controls to real environments, from managing enterprise assets and user accounts to detecting malware and securing cloud computing infrastructure. Whether you're supporting a small business, managing IT in a hybrid environment, or pursuing a computer information systems degree, this course will help you build the skills needed to reduce risk and improve security outcomes.

  • Identify and implement controls that protect sensitive information and devices
  • Manage computer hardware and operating systems across enterprise systems
  • Use audit logs, vulnerability scans, and account controls to reduce threats
  • Safeguard cloud and hybrid environments with aligned security practices
  • Build a foundation for applying CIS benchmarks and complying with industry standards
  • Support business requirements by reducing common attack surfaces
  • Develop readiness for roles in cybersecurity and computer information systems

By completing this course, you’ll be able to apply CIS Controls to protect sensitive information and data across endpoints, including mobile devices and cloud environments. You’ll understand how to reduce the risk of cyber attacks, support secure migration paths, and apply controls even in systems running prior versionsβ€”ensuring compatibility and visibility across your infrastructure and analysis centers.

Who Is This Course For

This course is designed for IT and cybersecurity professionals, managers, and students in computer information systems programs. It's ideal for anyone responsible for protecting important data or improving security in business or nonprofit environments.

Course Instructor

Kenneth Underhill

Kenneth Underhill, CEH, CHFI, has helped hundreds of thousands start their cybersecurity careers. He is the founder of Cyber Life, the Cyber Life School, and the Executive Producer and host of the Cyber Life television show, which reaches millions globally on platforms like Binge Networks, Amazon, Roku, and over 100 other streaming channels.

Kenneth has received multiple industry awards, including the 2019 Outstanding Educator award from SC Media, for his work in improving industry diversity and education. His online cybersecurity courses attract around 2 million participants annually.

Kenneth also serves on the boards of several cybersecurity startups and nonprofit advisory boards, including Breaking Barriers Women in Cybersecurity (BBWIC) and the Whole Cyber Human Initiative. He recently published his first book, "Hack the Cybersecurity Interview," which is available on Amazon and other retailers worldwide.

Read More

Read Less

Testimonials

Anonymous
β˜…β˜…β˜…β˜…β˜…

Elena M.

This course gave me a clear, structured understanding of the CIS Controls and how to apply them in real-world environments. I now feel confident assessing our security posture and prioritizing improvements for our systems and users.

Anonymous
β˜…β˜…β˜…β˜…β˜…

Jason O.

The breakdown of each control and its purpose made it easy to understand how to protect sensitive data and reduce common threats.

Anonymous
β˜…β˜…β˜…β˜…β˜…

Mira T.

I manage IT for a nonprofit and needed a practical way to improve our defenses without a huge budget. This training showed me how to apply essential controls across our cloud and on-prem systems, all while aligning with industry standards.

Show More

Show Less

Frequently Asked Questions

Students Who Took This Course Also Liked

Guarantee Your Cyber Security Career with the StationX Master’s Program!

Get real work experience and a job guarantee in the StationX Master’s Program. Dive into tailored training, mentorship, and community support that accelerates your career.

  • Job Guarantee & Real Work Experience: Launch your cybersecurity career with guaranteed placement and hands-on experience within our Master’s Program.
  • 30,000+ Courses and Labs: Hands-on, comprehensive training covering all the skills you need to excel in any role in the field.
  • Pass Certification Exams: Resources and exam simulations that help you succeed with confidence.
  • Mentorship and Career Coaching: Personalized advice, resume help, and interview coaching to boost your career.
  • Community Access: Engage with a thriving community of peers and professionals for ongoing support.
  • Advanced Training for Real-World Skills: Courses and simulations designed for real job scenarios.
  • Exclusive Events and Networking: Join events and exclusive networking opportunities to expand your connections.

TAKE THE NEXT STEP IN YOUR CAREER TODAY!

>

StationX Accelerator Pro

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Pro Program. Stay tuned for more!

StationX Accelerator Premium

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Premium Program. Stay tuned for more!

StationX Master's Program

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Master’s Program. Stay tuned for more!