About This Course

This Official Mile2 cyber security certification training course covers everything you need to know about IS20 Security Controls. 

Students will learn about inventory of authorized and unauthorized devices, inventory of authorized and unauthorized software, secure configurations for hardware and software on laptops, workstations and servers. 

It also includes secure configurations for hardware network devices such as firewalls, routers and switches, boundary defense, maintenance, monitoring, and analysis of audit logs, application software security, controlled use of administrative privileges, controlled access based on need to know. 

Also, continuous vulnerability assessment and remediation, account monitoring and control, malware defenses, limitation and control of network ports, protocols and services, wireless device control, data loss prevention, secure network engineering, penetration tests and red team exercises, incident response capability, data recovery capability, and security skills assessment and appropriate training to fill gaps. 

Our Promise to You

By the end of this course, you will have learned everything you need to know about IS20 Security Controls.

30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.

Get started today and learn more about the IS20 security controls.

Course Curriculum

Section 1 - Inventory Of Authorized And Unauthorized Devices
Inventory Of Authorized And Unauthorized Devices 00:00:00
Downloadable Materials 00:00:00
Section 2 - Inventory Of Authorized And Unauthorized Software
Inventory Of Authorized And Unauthorized Software 00:00:00
Section 3 - Secure Configurations For Hardware And Software On Laptops, Workstations And Servers
Secure Configurations For Hardware And Software On Laptops, Workstations And Servers 00:00:00
Section 4 - Secure Configurations For Hardware Network Devices Such As Firewalls, Routers And Switches
Secure Configurations For Hardware Network Devices Such As Firewalls, Routers And Switches 00:00:00
Section 5 - Boundary Defense
Boundary Defense 00:00:00
Section 6 - Maintenance, Monitoring, And Analysis Of Audit Logs
Maintenance, Monitoring, And Analysis Of Audit Logs 00:00:00
Section 7 - Application Software Security
Application Software Security 00:00:00
Section 8 - Controlled Use Of Administrative Privileges
Controlled Use Of Administrative Privileges 00:00:00
Section 9 - Controlled Access Based On Need To Know
Controlled Access Based On Need To Know 00:00:00
Section 10 - Continuous Vulnerability Assessment And Remediation
Continuous Vulnerability Assessment And Remediation 00:00:00
Section 11 - Account Monitoring And Control
Account Monitoring And Control 00:00:00
Section 12 - Malware Defenses
Malware Defenses 00:00:00
Section 13 - Limitation And Control Of Network Ports, Protocols And Services
Limitation And Control Of Network Ports, Protocols And Services 00:00:00
Section 14 - Wireless Device Control
Wireless Device Control 00:00:00
Section 15 - Data Loss Prevention
Data Loss Prevention 00:00:00
Section 16 - Secure Network Engineering
Secure Network Engineering 00:00:00
Section 17 - Penetration Tests And Red Team Exercises
Penetration Tests And Red Team Exercises 00:00:00
Section 18 - Incident Response Capability
Incident Response Capability 00:00:00
Section 19 - Data Recovery Capability
Data Recovery Capability 00:00:00
Section 20 - Security Skills Assessment And Appropriate Training To Fill Gaps
Security Skills Assessment And Appropriate Training To Fill Gaps 00:00:00
Template Design © VibeThemes. All rights reserved.

Setup Menus in Admin Panel