Get an iPad Air w/ Smart KB, or Google Pixel 4A Smartphone, or Take $350 Off with ANY qualifying 5-6 Day Course through April 21.
For special codes to use during registration, view offer details.
Associated Certification: GIAC Critical Controls Certification (GCCC)
Cybersecurity attacks are increasing and evolving so rapidly that it is more difficult than ever to prevent and defend against them. Does your organization have an effective method in place to detect, thwart, and monitor external and internal threats to prevent security breaches? This course helps you master specific, proven techniques and tools needed to implement and audit the Critical Security Controls as documented by the Center for Internet Security (CIS).
As threats evolve, an organization's security should too. To enable your organization to stay on top of this ever-changing threat scenario, SANS has designed a comprehensive course on how to implement the Critical Security Controls, a prioritized, risk-based approach to security. Designed by private and public sector experts from around the world, the Controls are the best way to block known attacks and mitigate damage from successful attacks. They have been adopted by the U.S. Department of Homeland Security, state governments, universities, and numerous private firms.
The Controls are specific guidelines that CISOs, CIOs, IGs, systems administrators, and information security personnel can use to manage and measure the effectiveness of their defenses. They are designed to complement existing standards, frameworks, and compliance schemes by prioritizing the most critical threat and highest payoff defenses, while providing a common baseline for action against risks that we all face.
The Controls are an effective security framework because they are based on actual attacks launched regularly against networks. Priority is given to Controls that (1) mitigate known attacks (2) address a wide variety of attacks, and (3) identify and stop attackers early in the compromise cycle.
The British government's Center for the Protection of National Infrastructure describes the Controls as the "baseline of high-priority information security measures and controls that can be applied across an organisation in order to improve its cyber defence."
SANS' in-depth, hands-on training will teach you how to master the specific techniques and tools needed to implement and audit the Critical Controls. It will help security practitioners understand not only how to stop a threat, but why the threat exists, and how to ensure that security measures deployed today will be effective against the next generation of threats.
The course shows security professionals how to implement the controls in an existing network through cost-effective automation. For auditors, CIOs, and risk officers, the course is the best way to understand how you will measure whether the Controls are effectively implemented.
The Critical Security Controls are listed below. You will find the full document describing the Critical Security Controls posted at the Center for Internet Security.
CIS Critical Security Controls
CSC 1: Inventory of Authorized and Unauthorized Devices
CSC 2: Inventory of Authorized and Unauthorized Software
CSC 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
CSC 4: Continuous Vulnerability Assessment and Remediation
CSC 5: Controlled Use of Administrative Privileges
CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs
CSC 7: Email and Web Browser Protections
CSC 8: Malware Defenses
CSC 9: Limitation and Control of Network Ports, Protocols, and Services
CSC 10: Data Recovery Capability
CSC 11: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
CSC 12: Boundary Defense
CSC 13: Data Protection
CSC 14: Controlled Access Based on the Need to Know
CSC 15: Wireless Access Control
CSC 16: Account Monitoring and Control
CSC 17: Security Skills Assessment and Appropriate Training to Fill Gaps
CSC 18: Application Software Security
CSC 19: Incident Response and Management
CSC 20: Penetration Tests and Red Team Exercises
YOU WILL BE ABLE TO:
ADDITIONAL RESOURCES:
Operational Cybersecurity Executive
YOU WILL RECEIVE:
In this course, you will receive the following:
During day 1, we will cover an introduction and overview of the Critical Security Controls, laying the foundation for the rest of the class. For each control the following information will be covered, and we will follow the same outline for each control:
In addition, Critical Security Controls 1 and 2 will be covered in depth.
CPE/CMU Credits: 6
During day 2, we will cover Critical Security Controls 3, 4, 5 and 6.
CPE/CMU Credits: 6
During day 3, we will cover Critical Security Controls 7, 8, 9, 10 and 11.
CPE/CMU Credits: 6
During day 4, we will cover Critical Security Controls 12, 13, 14 and 15.
CPE/CMU Credits: 6
During day 5, we will cover Critical Security Controls 16, 17, 18, 19 and 20.
CPE/CMU Credits: 6
Important! Bring your own system configured according to these instructions!
We ask that you do 5 things to prepare prior to class start. This early preparation will allow you to get the most out of your training. One of those five steps is ensuring that you bring a properly configured system to class. This document details the required system hardware and software configuration for your class. You can also watch a series of short videos on these topics at the following web link https://sansurl.com/sans-setup-videos.
A properly configured system is required to fully participate in this course. If you do not carefully read and follow these instructions, you will likely leave the class unsatisfied because you will not be able to participate in hands-on exercises that are essential to this course. Therefore, we strongly urge you to arrive with a system meeting all the requirements specified for the course.
SANS courses consist of instruction and hands-on sessions. The hands-on sessions are designed to allow students to utilize the knowledge gained throughout the course in an instructor-led environment. Students will have the opportunity to install, configure, and use the tools and techniques that they have learned. USB drives will be provided that will contain all of the tools required for the exercises, therefore the student's computer should have the ability to open and execute files from a USB drive.
Requirement #1: Bring a Laptop to Class
Students attending this course are required to bring a laptop computer in order to complete the exercises in class. Please make sure you bring a computer that meets the following requirements and that it is properly configured. There is not enough time in class to help you install your computer. Please note that your computer must be properly installed and configured before you come to class so you can get the most from the class. Please do not bring a regular production computer for this class! When installing software, there is always a chance of breaking something else on the system. Students should assume the worst and that all data could be lost.
Requirement #2: Laptop Hardware Requirements
In order to complete the in class activities, please ensure the laptop that you bring to class is configured with at least the following hardware:
*Please verify that virtualization is supported on your laptop prior to coming to class. More information on how to do so can be found at https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1003944.
Prior to coming to class, please ensure that the network interfaces are tested to prove that they can be configured and that all of the proper drivers have been installed.
Requirement #3: Laptop Operating System Requirements
In order to complete the in class activities, please ensure the laptop that you bring to class is configured with at least the following operating system or configurations:
Apple Mac OSX machines may be brought, however all lab activities assume that the host operating system is Microsoft Windows based. Students will need to be confident reconfiguring and administering their own system if they bring a laptop running any OS other than Microsoft Windows noted above. Note: Apple systems using the M1 processor cannot perform the necessary virtualization at this time and cannot be used for this course.
Requirement #4: Laptop Software Requirements
In order to complete the in class activities, please ensure the laptop that you bring to class is configured with at least the following software or configurations:
Our hope is that by following these simple instructions you will be able to make the most of your classroom experience.
Your course media will now be delivered via download. The media files for class can be large, some in the 40 - 50 GB range. You need to allow plenty of time for the download to complete. Internet connections and speed vary greatly and are dependent on many different factors. Therefore, it is not possible to give an estimate of the length of time it will take to download your materials. Please start your course media downloads as you get the link. You will need your course media immediately on the first day of class. Waiting until the night before the class starts to begin your download has a high probability of failure.
SANS has begun providing printed materials in PDF form. Additionally, certain classes are using an electronic workbook in addition to the PDFs. The number of classes using eWorkbooks will grow quickly. In this new environment, we have found that a second monitor and/or a tablet device can be useful by keeping the class materials visible while the instructor is presenting or while you are working on lab exercises.
If you have additional questions about the laptop specifications, please contactÃÂ laptop_prep@sans.org.
If you have additional questions about the laptop specifications, please contact laptop_prep@sans.org.
Alumni of
"The material is useful and scalable based on your organization's needs. The delivery of the content was excellent and the tools and resources offered are practical." - Tahisha Reid, Ernst & Young
"As we've had the opportunity to talk with information assurance engineers, auditors, and managers over the past ten years, we've seen frustration in the eyes of these hardworking individuals who are trying to make a difference in their organizations by better defending their data systems. It has even come to the point where some organizations have decided that it's simply too hard to protect their information, and many have started to wonder, is the fight really worth it? Will we ever succeed? We see companies and agencies making headway, but the offense keeps pushing. The goal of this course is to give direction and a realistic hope to organizations attempting to secure their systems.
The Critical Security Controls: Planning, Implementing, and Auditing offers direction and guidance from those in the industry who think through the eyes of the attacker as to what security controls will make the most impact. What better way to play defense than by understanding the mindset of the offense? By implementing our defense methodically and with the mindset of a hacker, we think organizations have a chance to succeed in this fight. We hope this course helps turn the tide."
- James Tarala & Kelli Tarala
"James is an excellent presenter and keeps people engaged and tries to keep it interactive." - Gregory Jaworski, Tanium