Essential Security Controls For All Organizations

Sajay Rai, CPA, CISSP, CISM

Founder of Securely Yours LLC

Understand key cybersecurity controls

Most organizations struggle to understand which cybersecurity are essential for their organization. This course will provide the top 50 controls every organization must consider. In addition, the course will outline how these controls should be implemented.

What you’ll learn

Learn what the key controls are, the technology behind the controls, how the controls can be implemented.

  • Understanding of key cybersecurity controls

  • How cybersecurity controls can be implemented

  • How cybersecurity controls technology works

  • Understand controls in 14 cyber domains

  • Understand controls related to different security frameworks.

  • Understand technical details behind the controls

  • Understand how technology works to operationalize the control

  • Understand the technology deployment

  • Understand the different software supporting the technology

Learn directly from Sajay

Sajay Rai, CPA, CISSP, CISM

Sajay Rai, CPA, CISSP, CISM

Sajay Rai is Founder of Securely Yours and Securely Managed.

Who this course is for

  • Intermediate to advanced professionals in cybersecurity

  • IT auditors with minimum of 2 years experience

  • IT Management and Executives who want to understand cybersecurity controls

What's included

Sajay Rai, CPA, CISSP, CISM

Live sessions

Learn directly from Sajay Rai, CPA, CISSP, CISM in a real-time, interactive format.

Lifetime access

Go back to course content and recordings whenever you need to.

Community of peers

Stay accountable and share insights with like-minded professionals.

Certificate of completion

Share your new skills with your employer or on LinkedIn.

Maven Guarantee

This course is backed by the Maven Guarantee. Students are eligible for a full refund up until the halfway point of the course.

Course syllabus

Week 1

Jun 2—Jun 7

    Introduction to Cybersecurity frameworks and controls

    0 items

    Jun

    2

    Session 1

    Tue 6/210:00 PM—11:00 PM (UTC)

    Jun

    4

    Session 2

    Thu 6/410:00 PM—11:00 PM (UTC)

Week 2

Jun 8—Jun 14

    Asset Management, Identity and Access Management, Network Security

    0 items

    Jun

    9

    Session 3

    Tue 6/910:00 PM—11:00 PM (UTC)

    Jun

    11

    Session 4

    Thu 6/1110:00 PM—11:00 PM (UTC)

Schedule

Live sessions

2 hrs / week

    • Tue, Jun 2

      10:00 PM—11:00 PM (UTC)

    • Thu, Jun 4

      10:00 PM—11:00 PM (UTC)

    • Tue, Jun 9

      10:00 PM—11:00 PM (UTC)

Projects

1 hr / week

Hands on exercise on Kali Linux tools

Async content

2 hrs / week

Frequently asked questions

$800

USD

Jun 2Jun 25
Enroll