Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
IS20 Security Controls Certification On-Demand Course
Description
IS20 Security Controls Certification On-Demand Introduction
Welcome to the IS20 Security Controls Certification On-Demand course. This comprehensive online training is designed for a diverse audience including information assurance managers, system implementers, IT administrators, auditors, and professionals within federal agencies or security vendors. The course offers a convenient, self-paced format that allows participants to master the top twenty critical security controls essential for robust information technology security.
The IS20 Security Controls are recognized as the industry standard for preventing and minimizing the impacts of cyber attacks. In this course, you’ll gain hands-on knowledge and practical skills for implementing and assessing these controls effectively. You’ll learn through a mix of theoretical concepts and real-world applications, guided by experts who are well-versed in the latest security practices.
By the end of the course, you will not only be equipped to apply these controls in various professional settings but also be prepared to ace the IS20 Controls certification exam, demonstrating your expertise in this critical area of information security.
IS20 Security Controls Certification On-Demand Course Highlights
- Understand the Fundamentals: Grasp the core concepts behind the top twenty critical security controls.
- Practical Implementation: Learn how to effectively implement these controls within your organization using automated tools.
- Assessment and Evaluation: Develop the skills necessary to assess the effectiveness of these controls and understand their impact on security posture.
- Preparation for Certification: Prepare thoroughly for the IS20 Controls exam to validate your knowledge and skills in managing and applying these security measures.
- Flexible Learning: Benefit from a self-paced online format that fits your schedule and professional commitments.
Prerequisites
- A fundamental understanding of networking and security technologies
Audience
This course is ideal for:
- Information assurance managers and auditors
- System implementers and administrators
- IT administrators
- Auditors and auditees
- Federal agencies and clients
- Security vendors and consulting groups committed to staying current with information assurance frameworks
IS20 Security Controls Certification On-Demand Course Outline
This on-demand course comprehensively covers the following critical security controls:
- Inventory of Authorized and Unauthorized Devices
- Inventory of Authorized and Unauthorized Software
- Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers
- Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
- Boundary Defense
- Maintenance, Monitoring, and Analysis of Audit Logs
- Application Software Security
- Controlled Use of Administrative Privileges
- Controlled Access Based on Need to Know
- Continuous Vulnerability Assessment and Remediation
- Account Monitoring and Control
- Malware Defenses
- Limitation and Control of Network Ports, Protocols, and Services
- Wireless Device Control
- Data Loss Prevention
- Secure Network Engineering
- Penetration Tests and Red Team Exercises
- Incident Response Capability
- Data Recovery Capability
- Security Skills Assessment and Appropriate Training to Fill Gaps
$1095.00
|
|