Securing company information is a significant responsibility that can be stressful and overwhelming, but you're not alone. This course will provide you with a comprehensive but digestible framework to confront a majority of infosec risks.
A question familiar to every information security professional is, “where do I start?” The CIS Controls get to the heart of the information security problem, putting security professionals in a position to make immediate and meaningful progress early in an information security program. In this course, Implementing the 20 CIS Critical Security Controls, you will find a practical framework to manage information security risks. First, you will learn about the history and purpose of the CIS controls. Next, you will learn about implementation groups to better understand the controls and sub-controls that make sense for your organization to implement. Finally, you will be equipped with 20 controls and over 170 sub-controls that can be customized to meet your organization's unique security requirements. When you're finished with this course, you will have the fundamental knowledge to address a majority of information security risks in your organization.
Taylor Jones is a Data Security Officer and security enthusiast/evangelist who loves to teach. Taylor is passionate about overcoming modern security challenges through meaningful solutions that reduce complexity and provide measurable risk reduction.
Course Overview [Autogenerated] Hello, everyone. My name is Taylor Jones. Welcome to my course on implementing the CIA's critical security controls. I am a data security officer and information security and risk enthusiast. In this course, we're going to introduce you to a successful and practical framework for orchestrating information security management and effectively reducing business risk. Some of the major topics that we will cover include evaluating implementation groups to better identify reasonable controls for your organization security and risk profile. Assessing and implementing a set of basic controls to rapidly address some of the most common threats and developing an information security road map by leveraging the CIA's basic foundational and organizational controls. By the end of this course, you will have the fundamental knowledge to address a majority of information security risks Before beginning this course. It would be helpful to have some basic information security knowledge, including understanding common information security, threats to confidentiality, integrity and availability, and some fundamental information security. Risk management knowledge would be useful. I hope you'll join me on this journey to learn about information security management with the implementing the C. I s critical security controls course at plural site