Framework: The Center for Internet Security (CIS) Top 18 Controls
Celková doba trvání:
6 h 25 min
Episode 1 — What are the CIS Critical Security Controls?
Framework: The Center for Internet Security (CIS) Top 18 Controls
08:17
Episode 2 — How to use CIS 18 in your organization
Framework: The Center for Internet Security (CIS) Top 18 Controls
08:17
Episode 3 — What is a “control” and what is a “safeguard”?
Framework: The Center for Internet Security (CIS) Top 18 Controls
08:52
Episode 4 — Glossary of common cybersecurity terms
Framework: The Center for Internet Security (CIS) Top 18 Controls
09:16
Episode 5 — Glossary of common cybersecurity terms
Framework: The Center for Internet Security (CIS) Top 18 Controls
09:17
Episode 6 — Overview – Why asset management is foundational
Framework: The Center for Internet Security (CIS) Top 18 Controls
07:37
Episode 7 — Safeguard 1.1 – Inventory of assets
Framework: The Center for Internet Security (CIS) Top 18 Controls
08:36
Episode 8 — Safeguard 1.2 – Address unauthorized assets
Framework: The Center for Internet Security (CIS) Top 18 Controls
08:48
Episode 9 — Remaining safeguards summary (Control 1)
Framework: The Center for Internet Security (CIS) Top 18 Controls
09:54
Episode 10 — Overview – Managing the software landscape
Framework: The Center for Internet Security (CIS) Top 18 Controls
08:57
Episode 11 — Safeguard 2.1 – Maintain a software inventory
Framework: The Center for Internet Security (CIS) Top 18 Controls
09:23
Episode 12 — Safeguard 2.2 – Only allow authorized software
Framework: The Center for Internet Security (CIS) Top 18 Controls
09:43
Episode 13 — Remaining safeguards summary (Control 2)
Framework: The Center for Internet Security (CIS) Top 18 Controls
08:36
Episode 14 — Overview – Protecting sensitive data
Framework: The Center for Internet Security (CIS) Top 18 Controls
08:33
Episode 15 — Safeguard 3.1 – Data classification and inventory
Framework: The Center for Internet Security (CIS) Top 18 Controls
08:55
Episode 16 — Safeguard 3.2 – Data retention and disposal
Framework: The Center for Internet Security (CIS) Top 18 Controls
10:10
Episode 17 — Safeguard 3.3 – Data encryption at rest and in transit
Framework: The Center for Internet Security (CIS) Top 18 Controls
10:12
Episode 18 — Remaining safeguards summary (Control 3)
Framework: The Center for Internet Security (CIS) Top 18 Controls
10:18
Episode 19 — Overview – Why secure configs matter
Framework: The Center for Internet Security (CIS) Top 18 Controls
09:37
Episode 20 — Safeguard 4.1 – Establish secure configuration baselines
Framework: The Center for Internet Security (CIS) Top 18 Controls
10:31
Episode 21 — Safeguard 4.2 – Automated configuration management
Framework: The Center for Internet Security (CIS) Top 18 Controls
09:46
Episode 22 — Remaining safeguards summary (Control 4)
Framework: The Center for Internet Security (CIS) Top 18 Controls
09:40
Episode 23 — Overview – Managing identity and accounts
Framework: The Center for Internet Security (CIS) Top 18 Controls
09:29
Episode 24 — Safeguard 5.1 – Inventory of accounts
Framework: The Center for Internet Security (CIS) Top 18 Controls
09:20
Episode 25 — Safeguard 5.2 – Centralized account management
Framework: The Center for Internet Security (CIS) Top 18 Controls
08:47
Episode 26 — Safeguard 5.3 – Disable dormant accounts
Framework: The Center for Internet Security (CIS) Top 18 Controls
10:36
Episode 27 — Remaining safeguards summary (Control 5)
Framework: The Center for Internet Security (CIS) Top 18 Controls
10:38
Episode 28 — Overview – Principles of least privilege
Framework: The Center for Internet Security (CIS) Top 18 Controls
11:07
Episode 29 — Safeguard 6.1 – Access authorization processes
Framework: The Center for Internet Security (CIS) Top 18 Controls
09:09
Episode 30 — Safeguard 6.2 – Role-based access control (RBAC)
Framework: The Center for Internet Security (CIS) Top 18 Controls
10:15
Episode 31 — Remaining safeguards summary (Control 6)
Framework: The Center for Internet Security (CIS) Top 18 Controls
11:00
Episode 32 — Overview – Why vulnerability management is continuous
Framework: The Center for Internet Security (CIS) Top 18 Controls
10:08
Episode 33 — Safeguard 7.1 – Vulnerability scanning tools
Framework: The Center for Internet Security (CIS) Top 18 Controls
10:20
Episode 34 — Safeguard 7.2 – Remediation timelines and SLAs
Framework: The Center for Internet Security (CIS) Top 18 Controls
10:09
Episode 35 — Safeguard 7.3 – Integration with patch management
Framework: The Center for Internet Security (CIS) Top 18 Controls
10:26
Episode 36 — Remaining safeguards summary (Control 7)
Framework: The Center for Internet Security (CIS) Top 18 Controls
09:26
Episode 37 — Overview – Logs as the backbone of detection
Framework: The Center for Internet Security (CIS) Top 18 Controls
09:51
Episode 38 — Safeguard 8.1 – Enable audit logging
Framework: The Center for Internet Security (CIS) Top 18 Controls
10:13
Episode 39 — Safeguard 8.2 – Centralized log collection and SIEM
Framework: The Center for Internet Security (CIS) Top 18 Controls
10:28
Episode 40 — Remaining safeguards summary (Control 8)
Framework: The Center for Internet Security (CIS) Top 18 Controls
10:33