Implementing and Auditing the Critical Security Controls - In-Depth

In the last couple of years it has become obvious that in the world of information security, the offense is outperforming the defense. Even though budgets increase and management pays more attention to the risks of data loss and system penetration, data is still being lost and systems are still being penetrated. Over and over people are asking, "What can we practically do to protect our information?" The answer has come in the form of 20 information assurance controls known as the Consensus Audit Guidelines (CAG).

Course syllabus:

  1. Introduction and Overview of the 20 Critical Controls

  2. Critical Controls 3, 4, 5 and 6

  3. Critical Controls 7, 8, 9, 10 and 11

  4. Critical Controls 12, 13, 14 and 15

  5. Critical Controls 16, 17, 18, 19 and 20