|IS20 Security Controls Online Training Series|
Membership Benefits include Free Unlimited Access to All Project Management, Business Skills, IT Service Management, IT Networking and Cyber Security Online Training Series and more. Become a Member Today!
Training Series Overview
This series covers everything you need to know about IS20 Security Controls. Students will learn about inventory of authorized and unauthorized devices, inventory of authorized and unauthorized software, secure configurations for hardware and software on laptops, workstations and servers, secure configurations for hardware network devices such as firewalls, routers and switches, boundary defense, maintenance, monitoring, and analysis of audit logs, application software security, controlled use of administrative privileges, controlled access based on need to know, continuous vulnerability assessment and remediation, account monitoring and control, malware defenses, limitation and control of network ports, protocols and services, wireless device control, data loss prevention, secure network engineering, penetration tests and red team exercises, incident response capability, data recovery capability, and security skills assessment and appropriate training to fill gaps.
Career Path: Professional roles include, but at not limited to Security Consultant/Analyst, Penetration Tester, Security Forensics Experts, and Network Security Engineer.
Series Taught By:
Becoming certified in Information Systems 20 Controls verifies that you have learned the important security controls and their methodologies as outlined by the US Department of Defense and other major players in the cyber security sector. You have an understanding of how attacks work and what needs to be done to prevent them. You are trained to improve security in networks by implementing the top 20 security controls, allowing you to prevent and detect. Those certified in IS20 Controls are now prepared to be leaders of future security projects, because they will have a plan for exactly what needs to be done in securing a network.
Certification Exam Details:
Does this training qualify for college credits?
Available CEUs for Course Series Completion: 5
Access Training Courses Below
Click any of the titles below to launch your videos:
Topic: Inventory of Authorized and Unauthorized Devices
Topic: Inventory of Authorized and Unauthorized Software
Topic: Secure Configurations for Hardware and Software on Laptops, Workstations and Servers
Topic: Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches
Topic: Boundary Defense
Topic: Maintenance, Monitoring, and Analysis of Audit Logs
Topic: Application Software Security
Topic: Controlled Use of Administrative Privileges
Topic: Controlled Access Based on Need to Know
Topic: Continuous Vulnerability Assessment and Remediation
Topic: Account Monitoring and Control
Topic: Malware Defenses
Topic: Limitation and Control of Network Ports, Protocols and Services
Topic: Wireless Device Control
Topic: Data Loss Prevention
Topic: Secure Network Engineering
Topic: Penetration Tests and Red Team Exercises
Topic: Incident Response Capability
Topic: Data Recovery Capability
Topic: Security Skills Assessment and Appropriate Training to Fill Gaps