Maxtrain.com - [email protected] - 513-322-8888 - 866-595-6863
This 3 day instructor led training course covers proven tools and methodologies needed to execute and analyze the Top Twenty Most Critical Security Controls. Nearly all organizations containing sensitive information are adopting these Security Controls, listed below, as the highest priority list of what must be substantiated before anything else.
These controls were chosen by leading government and private organizations who are experts on how attacks work and what can be done to prevent them from happening. The controls were selected as the best way to block known attacks as well as help search for and alleviate any damage from the attacks that are successful. This course allows the security professional to see how to implement controls in your existing network though highly effective and economical automation. For management, this training is the best way to distinguish how you will assess whether these security controls are effectively being administered.
Mile2 is Accredited by the NSA-CNSS, Approved on Homelands Security NICCS Framework, and is on the FBI’s Tier 1-3 Certification Training Chart.
Inventory of Authorized and Unauthorized Devices
Inventory of Authorized and Unauthorized Software
Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers
Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
Maintenance, Monitoring, and Analysis of Audit Logs
Application Software Security
Controlled Use of Administrative Privileges
Controlled Access Based on Need to Know
Continuous Vulnerability Assessment and Remediation
Account Monitoring and Control
Limitation and Control of Network Ports, Protocols, and Services
Wireless Device Control
Data Loss Prevention
Secure Network Engineering
Penetration Tests and Red Team Exercises
Incident Response Capability
Data Recovery Capability
Security Skills Assessment and Appropriate Training to Fill Gaps
3 Days Course