Introduction to CIS Critical Security Controls
Learn how to implement CIS Critical Security Controls to safeguard systems, users, and data. This course introduces key cybersecurity best practices to help IT and cybersecurity professionals protect sensitive information and reduce risk across all environments.

What Youβll Learn
This Introduction to CIS Critical Security Controls will teach you:
- CIS Controls overview:
Understand the purpose and structure of the 18 controls. - Control implementation:
Learn how to apply controls across systems and networks. - Data protection:
Explore best practices to secure sensitive information. - Access management:
Manage user accounts and permissions effectively.
- Malware defenses:
Defend systems using industry-recommended practices. - Secure configurations:
Harden devices and software to prevent cyber attacks. - Audit logging:
Monitor and analyze activity logs to detect threats. - Incident response:
Establish and manage plans for responding to security events.
Included in the Introduction to CIS
Suitable for the Following Careers
Course Content
CIS Security Controls
Audio Version of the Training
Requirements
Description of Introduction to CIS Critical Security Controls
Understanding how to protect systems, users, and data begins with the CIS Critical Security Controlsβa practical framework trusted by cybersecurity professionals worldwide. This course offers a clear introduction to these 18 prioritized safeguards, showing you how each control addresses specific security issues faced by organizations today.
Through focused, task-based lessons, youβll learn how to map controls to real environments, from managing enterprise assets and user accounts to detecting malware and securing cloud computing infrastructure. Whether you're supporting a small business, managing IT in a hybrid environment, or pursuing a computer information systems degree, this course will help you build the skills needed to reduce risk and improve security outcomes.
- Identify and implement controls that protect sensitive information and devices
- Manage computer hardware and operating systems across enterprise systems
- Use audit logs, vulnerability scans, and account controls to reduce threats
- Safeguard cloud and hybrid environments with aligned security practices
- Build a foundation for applying CIS benchmarks and complying with industry standards
- Support business requirements by reducing common attack surfaces
- Develop readiness for roles in cybersecurity and computer information systems
By completing this course, youβll be able to apply CIS Controls to protect sensitive information and data across endpoints, including mobile devices and cloud environments. Youβll understand how to reduce the risk of cyber attacks, support secure migration paths, and apply controls even in systems running prior versionsβensuring compatibility and visibility across your infrastructure and analysis centers.
Who Is This Course For
This course is designed for IT and cybersecurity professionals, managers, and students in computer information systems programs. It's ideal for anyone responsible for protecting important data or improving security in business or nonprofit environments.
Course Instructor
Kenneth Underhill, CEH, CHFI, has helped hundreds of thousands start their cybersecurity careers. He is the founder of Cyber Life, the Cyber Life School, and the Executive Producer and host of the Cyber Life television show, which reaches millions globally on platforms like Binge Networks, Amazon, Roku, and over 100 other streaming channels.
Kenneth has received multiple industry awards, including the 2019 Outstanding Educator award from SC Media, for his work in improving industry diversity and education. His online cybersecurity courses attract around 2 million participants annually.
Kenneth also serves on the boards of several cybersecurity startups and nonprofit advisory boards, including Breaking Barriers Women in Cybersecurity (BBWIC) and the Whole Cyber Human Initiative. He recently published his first book, "Hack the Cybersecurity Interview," which is available on Amazon and other retailers worldwide.
Read More
Read Less
Testimonials
Elena M.
This course gave me a clear, structured understanding of the CIS Controls and how to apply them in real-world environments. I now feel confident assessing our security posture and prioritizing improvements for our systems and users.
Jason O.
The breakdown of each control and its purpose made it easy to understand how to protect sensitive data and reduce common threats.
Mira T.
I manage IT for a nonprofit and needed a practical way to improve our defenses without a huge budget. This training showed me how to apply essential controls across our cloud and on-prem systems, all while aligning with industry standards.
Show More
Show Less