Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
IS20 Security Controls Certification On-Demand Course
Description
Course Introduction:
Welcome to the IS20 Security Controls Certification On-Demand course, your flexible path to becoming a master of the top twenty critical security controls in information technology.
Whether you serve as an information assurance manager, system implementer, IT administrator, auditor, or are part of a federal agency or security vendor, this self-paced course is thoughtfully designed to align with your schedule and aspirations.
Course Description:
The IS20 controls represent the pinnacle of twenty critical security controls in information technology. This on-demand training course equips you with the essential tools and methodologies required to proficiently execute and assess these controls.
Trusted by leading government and private organizations, these controls are paramount for preventing attacks and minimizing damage from successful ones.
This course not only empowers security professionals with insights into effective control implementation through automation but also provides management personnel with a comprehensive understanding of how to evaluate the administration of these security controls in the workplace.
Upon completion, you will be thoroughly prepared to excel in the IS20 Controls exam, substantiating your mastery of the top twenty critical controls in information security.
Course Highlights:
- Master the top twenty critical security controls at your own pace.
- Gain the expertise needed to implement these controls effectively.
- Prepare for and complete the IS20 Controls exam online.
- Mile2 is accredited by the NSA-CNSS, approved by Homeland Security NICCS Framework, and is featured on the FBI’s Tier 1-3 Certification Training Chart.
Prerequisites:
To excel in this course, participants should possess:
- A fundamental understanding of networking and security technologies
Audience:
This course is ideal for:
- Information assurance managers and auditors
- System implementers and administrators
- IT administrators
- Auditors and auditees
- Federal agencies and clients
- Security vendors and consulting groups committed to staying current with information assurance frameworks
Course Outline:
This on-demand course comprehensively covers the following critical security controls:
- Inventory of Authorized and Unauthorized Devices
- Inventory of Authorized and Unauthorized Software
- Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers
- Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
- Boundary Defense
- Maintenance, Monitoring, and Analysis of Audit Logs
- Application Software Security
- Controlled Use of Administrative Privileges
- Controlled Access Based on Need to Know
- Continuous Vulnerability Assessment and Remediation
- Account Monitoring and Control
- Malware Defenses
- Limitation and Control of Network Ports, Protocols, and Services
- Wireless Device Control
- Data Loss Prevention
- Secure Network Engineering
- Penetration Tests and Red Team Exercises
- Incident Response Capability
- Data Recovery Capability
- Security Skills Assessment and Appropriate Training to Fill Gaps
Outline
Critical Control 1:
Inventory of Authorized and Unauthorized Devices
Critical Control 2:
Inventory of Authorized and Unauthorized Software
Critical Control 3:
Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers
Critical Control 4:
Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
Critical Control 5:
Boundary Defense
Critical Control 6:
Maintenance, Monitoring, and Analysis of Audit Logs
Critical Control 7:
Application Software Security
Critical Control 8:
Controlled Use of Administrative Privileges
Critical Control 9:
Controlled Access Based on Need to Know
Critical Control 10:
Continuous Vulnerability Assessment and Remediation
Critical Control 11:
Account Monitoring and Control
Critical Control 12:
Malware Defenses
Critical Control 13:
Limitation and Control of Network Ports, Protocols, and Services
Critical Control 14:
Wireless Device Control
Critical Control 15:
Data Loss Prevention
Critical Control 16:
Secure Network Engineering
Critical Control 17:
Penetration Tests and Red Team Exercises
Critical Control 18:
Incident Response Capability
Critical Control 19:
Data Recovery Capability
Critical Control 20:
Security Skills Assessment and Appropriate Training to Fill Gaps
PreRequisites
A basic understanding of networking and security technologies
Audience
- Information assurance managers/auditors
- System implementers/administrators
- IT administrators
- Auditors/auditees
- Federal agencies/clients
- Security vendors and consulting groups looking to stay current with frameworks for information assurance
$1095.00
|
|