Logo

Maxtrain.com - [email protected] - 513-322-8888 - 866-595-6863

M2-IS20MOD

IS20 Security Controls Certification On-Demand Course

Description

Mile2®’s 3 day vendor-neutral IS20 Controls certification course covers proven general controls and methodologies that are used to execute and analyze the Top Twenty Most Critical Security Controls. This course allows the security professional to see how to implement controls in their existing network(s) through highly effective and economical automation. For management, this training is the best way to distinguish how you’ll assess whether these security controls are effectively being administered or if they are falling short of industry standards. Nearly all organizations containing sensitive information are adopting and implementing the most critical security controls as the highest priority list. 

CEUs: 24

Upon Completion

Upon completion, the IS20 Security Controls candidate will be able to not only competently take the IS20 Controls exam but will also have an understanding of how to implement the top 20 most critical controls in the workplace.

Exam Information

The IS20 Controls certification exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions.

Self-Study Package includes (1-year access):

  1. Online Video
  2. Electronic Book (Workbook)
  3. A Prep Guide to passing the CISSP Exam
  4. Exam
  5. Exam Simulator
  6. Exam Prep Questions
  7. Online Exam Prep Video

Outline

Module 0 - Course Introduction

Module I - Critical Control 1

  • Inventory of Authorized and Unauthorized Devices                     

Module 2 - Critical Control 2

  • Inventory of Authorized and Unauthorized Software

Module 3 - Critical Control 3

  • Secure Configurations for Hardware and Software on

Module 4 - Critical Control 4

  • Secure Configurations for Network Devices such as Firewalls, Routers, and Switches

Module 5 - Critical Control 5

  • Boundary Defense

Module 6 - Critical Control 6

  • Maintenance
  • Monitoring
  • Analysis of Audit Logs Network Ports
  • Protocols
  • Services

Module 7 - Critical Control 7

  • Application Software Security

Module 8 - Critical Control 8

  • Controlled Use of Administrative Privileges

Module 9- Critical Control 9

  • Controlled Access Based on Need to Know

Module 10 - Critical Control 10

  • Continuous Vulnerability Assessment
  • Remediation

Module 11 - Critical Control 11

  • Account Monitoring and Control

Module 12 - Critical Control 12

  • Malware Defenses

Module 13 - Critical Control 13

  • Limitation and Control of

 Module 14 - Critical Control 14

  • Wireless Device Control

Module 15 - Critical Control 15

  • Data Loss Prevention

Module 16 - Critical Control 16

  • Secure Network Engineering

Module 17 - Critical Control 17

  • Penetration Tests
  • Red Team Exercises

Module 18 - Critical Control 18

  • Incident Response Capability

Module 19 - Critical Control 19

  • Data Recovery Capability

Module 20 - Critical Control 20

  • Security Skills Assesment
  • Appropriate Training to Fill Gaps

PreRequisites

A basic understanding of networking and security technologies

Audience

  • Information assurance managers/auditors
  • System implementers/administrators
  • Network security engineers
  • IT administrators
  • Auditors/auditees
  • DoD personnel/contractors
  • Federal agencies/clients
  • Security vendors and consulting groups looking to stay current with frameworks for information assurance
$950.00 List Price


MAX Educ. Savings
Category:
Loading ...