About This Course
This Official Mile2 cyber security certification training course covers everything you need to know about IS20 Security Controls.
Students will learn about inventory of authorized and unauthorized devices, inventory of authorized and unauthorized software, secure configurations for hardware and software on laptops, workstations and servers.
It also includes secure configurations for hardware network devices such as firewalls, routers and switches, boundary defense, maintenance, monitoring, and analysis of audit logs, application software security, controlled use of administrative privileges, controlled access based on need to know.
Also, continuous vulnerability assessment and remediation, account monitoring and control, malware defenses, limitation and control of network ports, protocols and services, wireless device control, data loss prevention, secure network engineering, penetration tests and red team exercises, incident response capability, data recovery capability, and security skills assessment and appropriate training to fill gaps.
Our Promise to You
By the end of this course, you will have learned everything you need to know about IS20 Security Controls.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about the IS20 security controls.
|Section 1 - Inventory Of Authorized And Unauthorized Devices|
|Inventory Of Authorized And Unauthorized Devices||00:00:00|
|Section 2 - Inventory Of Authorized And Unauthorized Software|
|Inventory Of Authorized And Unauthorized Software||00:00:00|
|Section 3 - Secure Configurations For Hardware And Software On Laptops, Workstations And Servers|
|Secure Configurations For Hardware And Software On Laptops, Workstations And Servers||00:00:00|
|Section 4 - Secure Configurations For Hardware Network Devices Such As Firewalls, Routers And Switches|
|Secure Configurations For Hardware Network Devices Such As Firewalls, Routers And Switches||00:00:00|
|Section 5 - Boundary Defense|
|Section 6 - Maintenance, Monitoring, And Analysis Of Audit Logs|
|Maintenance, Monitoring, And Analysis Of Audit Logs||00:00:00|
|Section 7 - Application Software Security|
|Application Software Security||00:00:00|
|Section 8 - Controlled Use Of Administrative Privileges|
|Controlled Use Of Administrative Privileges||00:00:00|
|Section 9 - Controlled Access Based On Need To Know|
|Controlled Access Based On Need To Know||00:00:00|
|Section 10 - Continuous Vulnerability Assessment And Remediation|
|Continuous Vulnerability Assessment And Remediation||00:00:00|
|Section 11 - Account Monitoring And Control|
|Account Monitoring And Control||00:00:00|
|Section 12 - Malware Defenses|
|Section 13 - Limitation And Control Of Network Ports, Protocols And Services|
|Limitation And Control Of Network Ports, Protocols And Services||00:00:00|
|Section 14 - Wireless Device Control|
|Wireless Device Control||00:00:00|
|Section 15 - Data Loss Prevention|
|Data Loss Prevention||00:00:00|
|Section 16 - Secure Network Engineering|
|Secure Network Engineering||00:00:00|
|Section 17 - Penetration Tests And Red Team Exercises|
|Penetration Tests And Red Team Exercises||00:00:00|
|Section 18 - Incident Response Capability|
|Incident Response Capability||00:00:00|
|Section 19 - Data Recovery Capability|
|Data Recovery Capability||00:00:00|
|Section 20 - Security Skills Assessment And Appropriate Training To Fill Gaps|
|Security Skills Assessment And Appropriate Training To Fill Gaps||00:00:00|