IS20 Security Controls

No Rating(0)
See all reviews

This course is designed for those interested to learn the basics of cyber security in IS20 Security Controls which covers the inventory of devices and software, secure configurations, analysis of controlled access, vulnerability assessment, remediation, incident response and data recovery capability and security skills assessment provided with appropriate training to fill gaps.

Watch Free For 30 Days

start free access

-or-

buy single class $199
  • On Demand Video Lessons
  • Course Certificate
  • 24/7 Support

About This CourseBeginner

This Official Mile2 cyber security certification training course covers everything you need to know about IS20 Security Controls. 

Students will learn about inventory of authorized and unauthorized devices, inventory of authorized and unauthorized software, secure configurations for hardware and software on laptops, workstations and servers. 

It also includes secure configurations for hardware network devices such as firewalls, routers and switches, boundary defense, maintenance, monitoring, and analysis of audit logs, application software security, controlled use of administrative privileges, controlled access based on need to know. 

Also, continuous vulnerability assessment and remediation, account monitoring and control, malware defenses, limitation and control of network ports, protocols and services, wireless device control, data loss prevention, secure network engineering, penetration tests and red team exercises, incident response capability, data recovery capability, and security skills assessment and appropriate training to fill gaps. 

Our Promise to You

By the end of this course, you will have learned everything you need to know about IS20 Security Controls.

30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.

Get started today and learn more about the IS20 security controls.

Course Curriculum

Course Sections

Inventory Of Authorized And Unauthorized Devices

Downloadable Materials

Inventory Of Authorized And Unauthorized Software

Secure Configurations For Hardware And Software On Laptops, Workstations And Servers

Secure Configurations For Hardware Network Devices Such As Firewalls, Routers And Switches

Boundary Defense

Maintenance, Monitoring, And Analysis Of Audit Logs

Application Software Security

Controlled Use Of Administrative Privileges

Controlled Access Based On Need To Know

Continuous Vulnerability Assessment And Remediation

Account Monitoring And Control

Malware Defenses

Limitation And Control Of Network Ports, Protocols And Services

Wireless Device Control

Data Loss Prevention

Secure Network Engineering

Penetration Tests And Red Team Exercises

Incident Response Capability

Data Recovery Capability

Security Skills Assessment And Appropriate Training To Fill Gaps

Reviews

No Reviews found for this course.