Become a Member   |   Contact Us   |   Marketplace   |   Sign In
IS20 Security Controls Online Training Series

Training Series Overview

This Official Mile2® cyber security certification training series covers everything you need to know about IS20 Security Controls. Students will learn about inventory of authorized and unauthorized devices, inventory of authorized and unauthorized software, secure configurations for hardware and software on laptops, workstations and servers, secure configurations for hardware network devices such as firewalls, routers and switches, boundary defense, maintenance, monitoring, and analysis of audit logs, application software security, controlled use of administrative privileges, controlled access based on need to know, continuous vulnerability assessment and remediation, account monitoring and control, malware defenses, limitation and control of network ports, protocols and services, wireless device control, data loss prevention, secure network engineering, penetration tests and red team exercises, incident response capability, data recovery capability, and security skills assessment and appropriate training to fill gaps.

Career Path: Professional roles include, but at not limited to Security Consultant/Analyst, Penetration Tester, Security Forensics Experts, and Network Security Engineer.

Official Mile2® IS20 Training Series Taught By: Tracy Preston

Certification Details

Becoming certified in Information Systems 20 Controls verifies that you have learned the important security controls and their methodologies as outlined by the US Department of Defense and other major players in the cyber security sector. You have an understanding of how attacks work and what needs to be done to prevent them. You are trained to improve security in networks by implementing the top 20 security controls, allowing you to prevent and detect. Those certified in IS20 Controls are now prepared to be leaders of future security projects, because they will have a plan for exactly what needs to be done in securing a network.

Certification Exam Details:
IS20 Security Controls: Learn More about this certification exam.

Available CEUs for Course Series Completion: 5
Students can earn up to 5 CEUs for fully completing this course series. This information will be displayed on the certificate of completion. Learn More

Access Training Courses Below

Click any of the titles below to launch your videos:

Course 01 - Inventory of Authorized and Unauthorized DevicesAccess Now - No Membership Required 6m

Course 02 - Inventory of Authorized and Unauthorized Software 6m

Course 03 - Secure Configurations for Hardware and Software on Laptops, Workstations and Servers 12m

Course 04 - Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches 13m

Course 05 - Boundary Defense 9m

Course 06 - Maintenance, Monitoring, and Analysis of Audit Logs 9m

Course 07 - Application Software Security 14m

Course 08 - Controlled Use of Administrative Privileges 9m

Course 09 - Controlled Access Based on Need to Know 6m

Course 10 - Continuous Vulnerability Assessment and Remediation 10m

Course 11 - Account Monitoring and Control 10m

Course 12 - Malware Defenses 10m

Course 13 - Limitation and Control of Network Ports, Protocols and Services 7m

Course 14 - Wireless Device Control 14m

Course 15 - Data Loss Prevention 9m

Course 16 - Secure Network Engineering 6m

Course 17 - Penetration Tests and Red Team Exercises 11m

Course 18 - Incident Response Capability 7m

Course 19 - Data Recovery Capability 6m

Course 20 - Security Skills Assessment and Appropriate Training to Fill Gaps 8m

Training Final Exam

Are you ready to earn your certificate of completion? If so, Launch the Final Exam below to do so now!

Training Final Exam