Welcome to our course series on CIS Top 18 Critical Security Controls v8. In this course covering control 2: Inventory and Control of Software Assets, you'll demonstrate how to collect software inventory across the network. Plus, get hands-on training as you allowlist authorized software and scripts.
By the end of this course, students should be able to:
- Explain the concept of security controls
- Enumerate the eighteen (18) areas of critical security controls
- Implement technical security controls related to these areas