CIS Controls Mastery Course for MSPs

Overview
- Course Length: 48 hours
- Interactive, gamified cybersecurity labs that simulate real-world attack scenarios.
- Direct mentorship from John Strand.
- Certified competency recognized by CREST
CIS Controls Mastery Course for MSPs: The Ultimate Path to CIS Accreditation
CIS Controls Mastery Course for MSPs is presented by John Strand, Founder of Black Hills Information Security , and a three-way partnership between Antisyphon Training, CIS, and Right of Boom.
Abstract
The CIS Controls Mastery Course for MSPs is an intensive, hands-on training program designed by John Strand, a globally recognized cybersecurity expert and the founder of Black Hills Information Security (BHIS). This comprehensive course is officially authorized by the Center for Internet Security (CIS) and recognized as a mandatory requirement for CIS accreditation by CREST, the premier accreditation body for global cybersecurity standards.
This master class is tailored for cybersecurity professionals aiming to achieve a deep, practical understanding of CIS Controls, penetration testing methodologies, and Security Operations Center (SOC) core skills. It blends expert-led instruction with real-world scenarios, equipping participants with the knowledge and practical experience necessary to excel in today’s complex threat landscape.
What’s Included in the CIS Master Class?
1. CIS Controls Mastery
- In-depth exploration of CIS Controls v8, focusing on their implementation, management, and continuous improvement.
- Real-world case studies showcasing how organizations apply these controls to mitigate advanced threats.
- Strategies for mapping CIS Controls to other security frameworks (e.g., NIST, ISO 27001).
2. Strand’s Introduction to Penetration Testing
- Learn ethical hacking techniques from one of the industry’s foremost experts.
- Cover reconnaissance, vulnerability assessment, exploitation, and post-exploitation tactics.
- Hands-on labs to practice attack simulations in controlled environments.
3. SOC Core Skills Training
- Foundational and advanced SOC operations, including log analysis, threat hunting, and incident response.
- Techniques for identifying and mitigating threats in real-time using SIEM tools and threat intelligence feeds.
- Practical exercises designed to enhance analytical thinking and rapid response capabilities.
4. Hands-On Labs Powered by MetaCTF
- Interactive, gamified cybersecurity labs that simulate real-world attack scenarios.
- Participants will apply their skills in a dynamic environment, reinforcing key concepts learned throughout the course.
- Focus on offensive and defensive strategies to understand the full spectrum of cybersecurity operations.
5. CIS Competency Assessment (100-Question Exam)
- A rigorous, 100-question assessment designed to validate mastery of CIS Controls and practical cybersecurity skills.
- Successful completion of the exam demonstrates the competency required for the step in getting CIS accreditation by CREST.
Who Should Attend?
- MSP & MSSPs responsible for managing both their own and their client’s security programs.
- IT and Security Managers responsible for implementing and managing CIS Controls.
- Compliance Officers aiming to align organizational practices with global security standards.
Key Takeaways
- CIS Controls expertise backed by real-world application.
- Certified competency recognized by CREST—essential for career advancement.
- Hands-on experience with tools and techniques used by top-tier cybersecurity professionals.
Key Takeaways
- CIS Controls expertise backed by real-world application.
- Certified competency recognized by CREST—essential for career advancement.
- Hands-on experience with tools and techniques used by top-tier cybersecurity professionals.
Direct mentorship from John Strand, one of the most respected voices in cybersecurity.
Who Should Attend?
- MSP & MSSPs responsible for managing both their own and their client’s security programs.
- IT and Security Managers responsible for implementing and managing CIS Controls.
- Compliance Officers aiming to align organizational practices with global security standards.
Audience Skill Level
- Business Leaders who are driving Governance in their MSP
- New MSP Technicians
- Junior & Senior Security Analysts
- IT Support Staff transitioning into cybersecurity
John Strand is a prominent figure in the cybersecurity community, renowned for his extensive experience and contributions to the field. He began his journey with Accenture Consulting, focusing on intrusion detection, incident response, and vulnerability assessment. Later, he joined Northrop Grumman, specializing in security architectures and program certification. His passion for education led him to the SANS Institute, where he became a senior instructor, teaching courses such as SEC504: Hacker Techniques, Exploits, and Incident Handling, and SEC560: Network Penetration Testing and Ethical Hacking. Over approximately 15 years with SANS, John earned a reputation as a coveted speaker and a much-loved teacher.
In 2008, John founded Black Hills Information Security (BHIS), a company dedicated to penetration testing, consulting, and defensive security services. Under his leadership, BHIS has assisted organizations of all sizes, from small community banks to Fortune 100 companies, in strengthening their security postures. John’s vision for BHIS emphasizes a collaborative approach, aiming to empower rather than intimidate clients. He ensures that penetration tests are both thorough and educational, providing clear and actionable reports that help organizations improve their infrastructure and staff capabilities.
Beyond his roles as an instructor and business owner, John has significantly influenced the cybersecurity industry through various initiatives. He is a contributor to the Penetration Testing Execution Standard and the 20 Critical Controls frameworks, both of which have shaped industry best practices. Recognizing the importance of accessible education, John established Antisyphon Training, offering courses designed to equip students with practical skills directly applicable to their roles. Additionally, he co-founded Active Countermeasures, focusing on network threat hunting solutions. Through these endeavors, John has been instrumental in advancing cybersecurity practices and fostering a community dedicated to continuous learning and improvement.
System Requirements
- VM Labs
- A laptop with a browser and a stable internet connection
- Antisyphon Cyber Range and Certification
- A laptop with a browser and a stable internet connection
- A way to run cybersecurity tools either directly on your laptop or inside a local virtual machine
- At least 16 GB of RAM
- Administrator/root permissions
A browser-accessible Kali VM might also work in lieu of the above.
Subscription Details
-
Train at your own pace with no set course schedule
-
Access to all course resources, including slides and VMs
-
Subject Matter Expert support through Discord
- Tips, tools, and techniques that can be applied immediately upon returning to work
- Strengthen your skills by solving challenges within the Antisyphon Cyber Range
- Become part of a community driven to educate and share knowledge
- Billed yearly on a subscription basis
Subscription Terms
$1,500.00 / year
Course Categories:
Cloud, Forensics, Fundamentals, Incident Response, Leadership, Linux, Microsoft Windows