CSIS Top 20 Critical Security Controls Training Boot Camp

Transform your career in 5 days

This boot camp helps you master the 20 Important Security Controls as published by the Center for Strategic and International Studies (CSIS).

4.6 (738 ratings)

Affirm Financing available
100% Satisfaction Guarantee Logo

Course essentials

CSIS Top 20 Critical Security Controls training at a glance

  • Method

    Online, in-person, team onsite

  • Duration

    5 days

  • Experience

    1-3 years of experience

What you'll learn

Training overview

Securing the United States against cyber-attacks has become one of the nation’s highest priorities. To achieve this objective, networks, systems, and the operations teams that support them must vigorously defend against external attacks. Furthermore, for those external attacks that are successful, defenses must be capable of thwarting, detecting and responding to follow-on attacks on internal networks as attackers spread inside a compromised network.

This group of 20 crucial controls is designed to begin the process of establishing a prioritized baseline of information security measures and controls that can be applied across enterprise environments. Fifteen of these controls can be monitored, at least in part, automatically and continuously. Five controls are essential but do not appear to be able to be monitored continuously or automatically with current technology and practices.

Who should attend

Who Should Attend Image
  • Information security professionals
  • Network administrators
  • System architects and engineers
  • IT and security managers
  • Anyone looking to learn about critical security controls

Award-winning training you can trust

Don't take our word for it

Read our independent reviews via TrustRadius

  • 10 out of 10 March 04, 2024

    An excellent choice to keep up with cybersecurity education

    The field of information security is constantly evolving as new threats are discovered each day. Our consultants have to keep up with new knowledge and techniques to conduct pentesting, vulnerability remediation, computer forensic audits, and so on. Traditional training in cybersecurity is very expensive, lengthy, and lacks practical experience. When we found Infosec Skills we were impressed with the many themes available in their library, their focus, and also with the price, which is very economic in comparison with other alternatives. Also, their cyber ranges allow our employees to practice the skills needed in a very practical way. We are very happy to count on Infosec [Skills] as an educational ally.

    Karina Astudillo

    Karina Astudillo

    CEO (Chief Executive Officer)

  • 10 out of 10 March 01, 2024

    Fantastic Product

    Our security department is in its infancy and we use it daily to learn best practices and educate ourselves on tools that can be used to help secure our environment. There are a couple of staff members looking to obtain certifications and it's also used to prepare them for the test.

    Brian Shetter

    Brian Shetter

    Security Engineer / Analyst

  • 10 out of 10 August 28, 2023

    The top notch cyber security knowledge hub

    We have relied on Infosec Skills to get the latest data and information on cyber security. The company has welcoming staff that interacts freely with our members during training sessions. I have acquired top notch skills of discovering threats from internet. The frequent awareness data helps us to set policies of countering new forms of ransomware attacks. I have advanced my knowledge on modern cyber attacks and I can collaborate with my colleagues with confidence.

    Susan Davone

    Susan Davone

    Administrative Clerk

Ready to discuss your training goals? We've got you covered.

Complete the form and book a meeting with a member of our team to explore your learning opportunities.

Sorry, we're unable to load the form at the moment. Please check your browser's settings to confirm the form is not blocked. You can contact us and report the issue here: infosec.info@cengage.com.

Step 1

Step 2

Finish

Step 1

Step 2

Finish

Thanks! We look forward to meeting with you!

What's included

Everything you need to know

 Certification Logo
  • 90-day extended access to Boot Camp components, including class recordings
  • 100% Satisfaction Guarantee
  • Free 90-day Infosec Skills subscription (access to 1,400+ additional courses and labs)
  • Knowledge Transfer Guarantee

What makes the Infosec CSIS prep course different?

You can rest assured that the CSIS training materials are fully updated and synced with the latest version of the exam. With 20 years of training experience, we stand by our CSIS training with 100% satisfaction guaranteed. This means if you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.

Syllabus

Training schedule

Day 1
Morning session

Information Security Overview

  • Mitigating Threats
  • Organizational Security
  • User- and Role-based Security
  • Authentication
  • Peripheral Security
  • Application and Messaging Security
  • Cryptography
Afternoon session

Information Security Overview continued

Schedule may vary from class to class

Day 2
Morning session

Information Security Overview

  • Public Key Infrastructure
  • Network Security
  •  Ports and Protocols
  •  Wireless Security
  •  Remote Access Security
  •  Vulnerability Testing and Monitoring
  •  Business Continuity
Afternoon session

Information Security Overview continued

Schedule may vary from class to class

Day 3
Morning session

The Top 20 Controls

  • Inventory of authorized and unauthorized devices
  • Inventory of authorized and unauthorized software
  • Secure configurations for hardware and software on workstations and servers
  • Continuous vulnerability assessment
  • Malware defenses
  • Application software security
  • Wireless device control
  • Data recovery capability
Afternoon session

The Top 20 Controls continued

Schedule may vary from class to class

Day 4
Morning session

The Top 20 Controls continued

  • Security skills assessment and appropriate training to fill gaps
  • Secure configurations for network devices such as Firewalls, Routers, and Switches
  • Limitation and control of network ports, protocols, and services
  • Controlled use of administrative privileges
  • Boundary defense
Afternoon session

The Top 20 Controls continued

Schedule may vary from class to class

Day 5
Morning session

The Top 20 Controls continued

  • Maintenance, monitoring, and analysis of security audit logs
  • Controlled access based on the need to know
  • Account monitoring and control
  • Data loss prevention
  • Incident response management
  • Secure network engineering
  • Penetration tests and red team exercises
Afternoon session

The Top 20 Controls continued

Schedule may vary from class to class

Unlock team training discounts

If you’re like many of our clients, employee certification is more than a goal — it’s a business requirement. Connect with our team to learn more about our training discounts.

Guaranteed results

Our boot camp guarantees

100% Satisfaction Guarantee

If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.

Knowledge Transfer Guarantee

If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.