July 2018
Intermediate to advanced
356 pages
9h 18m
English
Q. What are the suggested open source security monitoring tools corresponding to the 20 CIS Critical Security Controls for Effective Cyber Defense?
|
Cyber security controls |
Examples of security techniques |
|
CSC1: Inventory of Authorized and Unauthorized Devices |
Endpoint security, asset management |
|
CSC2: Inventory of Authorized and Unauthorized Software |
Endpoint security, asset management |
|
CS3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. |
CIS Security Benchmark, OpenSCAP |
|
CSC4: Continuous Vulnerability Assessment and Remediation |
OpenVAS: http://www.openvas.org/ Nmap: https://nmap.org/ OWASP Dependency Check: https://www.owasp.org/index.php/OWASP_Dependency_Check ... |