IS20 Security Controls
This course is designed for those interested to learn the basics of cyber security in IS20 Security Controls which covers the inventory of devices and software, secure configurations, analysis of controlled access, vulnerability assessment, remediation, incident response and data recovery capability and security skills assessment provided with appropriate training to fill gaps.
About This Coursebeginner
This Official Mile2 cyber security certification training course covers everything you need to know about IS20 Security Controls.
Students will learn about inventory of authorized and unauthorized devices, inventory of authorized and unauthorized software, secure configurations for hardware and software on laptops, workstations and servers.
It also includes secure configurations for hardware network devices such as firewalls, routers and switches, boundary defense, maintenance, monitoring, and analysis of audit logs, application software security, controlled use of administrative privileges, controlled access based on need to know.
Also, continuous vulnerability assessment and remediation, account monitoring and control, malware defenses, limitation and control of network ports, protocols and services, wireless device control, data loss prevention, secure network engineering, penetration tests and red team exercises, incident response capability, data recovery capability, and security skills assessment and appropriate training to fill gaps.
Our Promise to You
By the end of this course, you will have learned everything you need to know about IS20 Security Controls.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about the IS20 security controls.
Inventory Of Authorized And Unauthorized Devices
Inventory Of Authorized And Unauthorized Software
Secure Configurations For Hardware And Software On Laptops, Workstations And Servers
Section 4 - Secure Configurations For Hardware Network Devices Such As Firewalls, Routers And Switches
Secure Configurations For Hardware Network Devices Such As Firewalls, Routers And Switches
Maintenance, Monitoring, And Analysis Of Audit Logs
Application Software Security
Controlled Use Of Administrative Privileges
Controlled Access Based On Need To Know
Continuous Vulnerability Assessment And Remediation
Account Monitoring And Control
Limitation And Control Of Network Ports, Protocols And Services
Wireless Device Control
Data Loss Prevention
Secure Network Engineering
Penetration Tests And Red Team Exercises
Incident Response Capability
Data Recovery Capability
Security Skills Assessment And Appropriate Training To Fill Gaps
No Reviews found for this course.