Please ensure Javascript is enabled for purposes of website accessibility

About This Course

Who this course is for:

  • Information assurance managers or auditors
  • System implementers or administrators
  • Network security engineers and auditors

What you’ll learn: 

  • The top 20 most critical security controls
  • Inventory of authorized and unauthorized devices
  • Inventory of authorized and unauthorized software
  • Secure configurations for hardware and software on laptops, workstations and servers 
  • Secure configurations for hardware network devices
  • Continuous vulnerability assessment and remediation
  • Account monitoring and control
  • Secure network engineering
  • Penetration tests and red team exercises
  • Incident response capability
  • Data recovery capability

Requirements: 

  • Basic understanding of networking and security technologies

This Official Mile2 cyber security certification training course covers everything you need to know about IS20 Security Controls. 

Our Promise to You

By the end of this course, you will have learned everything you need to know about IS20 Security Controls.

30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.

Get started today and learn more about the IS20 security controls.

Course Curriculum

Section 1 - Inventory Of Authorized And Unauthorized Devices
Inventory Of Authorized And Unauthorized Devices 00:00:00
Downloadable Materials 00:00:00
Section 2 - Inventory Of Authorized And Unauthorized Software
Inventory Of Authorized And Unauthorized Software 00:00:00
Section 3 - Secure Configurations For Hardware And Software On Laptops, Workstations And Servers
Secure Configurations For Hardware And Software On Laptops, Workstations And Servers 00:00:00
Section 4 - Secure Configurations For Hardware Network Devices Such As Firewalls, Routers And Switches
Secure Configurations For Hardware Network Devices Such As Firewalls, Routers And Switches 00:00:00
Section 5 - Boundary Defense
Boundary Defense 00:00:00
Section 6 - Maintenance, Monitoring, And Analysis Of Audit Logs
Maintenance, Monitoring, And Analysis Of Audit Logs 00:00:00
Section 7 - Application Software Security
Application Software Security 00:00:00
Section 8 - Controlled Use Of Administrative Privileges
Controlled Use Of Administrative Privileges 00:00:00
Section 9 - Controlled Access Based On Need To Know
Controlled Access Based On Need To Know 00:00:00
Section 10 - Continuous Vulnerability Assessment And Remediation
Continuous Vulnerability Assessment And Remediation 00:00:00
Section 11 - Account Monitoring And Control
Account Monitoring And Control 00:00:00
Section 12 - Malware Defenses
Malware Defenses 00:00:00
Section 13 - Limitation And Control Of Network Ports, Protocols And Services
Limitation And Control Of Network Ports, Protocols And Services 00:00:00
Section 14 - Wireless Device Control
Wireless Device Control 00:00:00
Section 15 - Data Loss Prevention
Data Loss Prevention 00:00:00
Section 16 - Secure Network Engineering
Secure Network Engineering 00:00:00
Section 17 - Penetration Tests And Red Team Exercises
Penetration Tests And Red Team Exercises 00:00:00
Section 18 - Incident Response Capability
Incident Response Capability 00:00:00
Section 19 - Data Recovery Capability
Data Recovery Capability 00:00:00
Section 20 - Security Skills Assessment And Appropriate Training To Fill Gaps
Security Skills Assessment And Appropriate Training To Fill Gaps 00:00:00
top
Template Design © VibeThemes. All rights reserved.

Setup Menus in Admin Panel