CSIS Top 20 Critical Security Controls Training Boot Camp

Transform your career in 5 days

This boot camp helps you master the 20 Important Security Controls as published by the Center for Strategic and International Studies (CSIS).

4.6 (738 ratings)

Affirm Financing available
100% Satisfaction Guarantee Logo

Course essentials

Boot camp at a glance

  • Method

    Online, in-person, team onsite

  • Duration

    5 days

  • Experience

    1-3 years of experience

What you'll learn

Training overview

Securing the United States against cyber-attacks has become one of the nation’s highest priorities. To achieve this objective, networks, systems, and the operations teams that support them must vigorously defend against external attacks. Furthermore, for those external attacks that are successful, defenses must be capable of thwarting, detecting and responding to follow-on attacks on internal networks as attackers spread inside a compromised network.

This group of 20 crucial controls is designed to begin the process of establishing a prioritized baseline of information security measures and controls that can be applied across enterprise environments. Fifteen of these controls can be monitored, at least in part, automatically and continuously. Five controls are essential but do not appear to be able to be monitored continuously or automatically with current technology and practices.

Who should attend

Who Should Attend Image
  • Information security professionals
  • Network administrators
  • System architects and engineers
  • IT and security managers
  • Anyone looking to learn about critical security controls

Award-winning training you can trust

Ready to discuss your training goals? We've got you covered.

Complete the form and book a meeting with a member of our team to explore your learning opportunities.

This is where the error message would go.

Step 1

Finish

Thanks! We look forward to meeting with you!

What's included

Everything you need to know

 Certification Logo
  • 90-day extended access to Boot Camp components, including class recordings
  • 100% Satisfaction Guarantee
  • Free 90-day Infosec Skills subscription (access to 1,400+ additional courses and labs)
  • Knowledge Transfer Guarantee

What makes the Infosec CSIS prep course different?

You can rest assured that the CSIS training materials are fully updated and synced with the latest version of the exam. With 20 years of training experience, we stand by our CSIS training with 100% satisfaction guaranteed. This means if you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.

Syllabus

Training schedule

Day 1
Morning session

Information Security Overview

  • Mitigating Threats
  • Organizational Security
  • User- and Role-based Security
  • Authentication
  • Peripheral Security
  • Application and Messaging Security
  • Cryptography
Afternoon session

Information Security Overview continued

Schedule may vary from class to class

Day 2
Morning session

Information Security Overview

  • Public Key Infrastructure
  • Network Security
  •  Ports and Protocols
  •  Wireless Security
  •  Remote Access Security
  •  Vulnerability Testing and Monitoring
  •  Business Continuity
Afternoon session

Information Security Overview continued

Schedule may vary from class to class

Day 3
Morning session

The Top 20 Controls

  • Inventory of authorized and unauthorized devices
  • Inventory of authorized and unauthorized software
  • Secure configurations for hardware and software on workstations and servers
  • Continuous vulnerability assessment
  • Malware defenses
  • Application software security
  • Wireless device control
  • Data recovery capability
Afternoon session

The Top 20 Controls continued

Schedule may vary from class to class

Day 4
Morning session

The Top 20 Controls continued

  • Security skills assessment and appropriate training to fill gaps
  • Secure configurations for network devices such as Firewalls, Routers, and Switches
  • Limitation and control of network ports, protocols, and services
  • Controlled use of administrative privileges
  • Boundary defense
Afternoon session

The Top 20 Controls continued

Schedule may vary from class to class

Day 5
Morning session

The Top 20 Controls continued

  • Maintenance, monitoring, and analysis of security audit logs
  • Controlled access based on the need to know
  • Account monitoring and control
  • Data loss prevention
  • Incident response management
  • Secure network engineering
  • Penetration tests and red team exercises
Afternoon session

The Top 20 Controls continued

Schedule may vary from class to class

Unlock team training discounts

If you’re like many of our clients, employee certification is more than a goal — it’s a business requirement. Connect with our team to learn more about our training discounts.

Guaranteed results

Our boot camp guarantees

100% Satisfaction Guarantee

If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.

Knowledge Transfer Guarantee

If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.

You're in good company

EH

The instructor was able to take material that prior to the class had made no sense, and explained it in real world scenarios that were able to be understood.

Erik Heiss, United States Air Force
MJ

I really appreciate that our instructor was extremely knowledgeable and was able to provide the information in a way that it could be understood. He also provided valuable test-taking strategies that I know not only helped me with this exam, but will help in all exams I take in the future.

Michelle Jemmott, Pentagon
RC

The course was extremely helpful and provided exactly what we needed to know in order to successfully navigate the exam. Without this I am not confident I would have passed.

Robert Caldwell, Salient Federal Solutions