Welcome to our course series on CIS Top 18 Critical Security Controls v8. In this course covering control 1: Inventory and Control of Enterprise Assets, you'll learn how to maintain a detailed asset inventory, utilize an active directory (AD) tool, and prevent or block rogue devices. Train to safeguard your organization against critical threats.
Learning Objectives
By the end of this course, students should be able to:
- Explain the concept of security controls
- Enumerate the eighteen (18) areas of critical security controls
- Implement technical security controls related to these areas
Framework Connections
Specialty Areas
- Cyber Operations
- Exploitation Analysis
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.