IS20 Security Controls

This series covers everything you need to know about IS20 Security Controls.
    • Learning Style
      Self-Paced Learning
    • Difficulty
      Intermediate
    • Course Duration
      3 Hours
This series covers everything you need to know about IS20 Security Controls.
Start FREE Subscription Trial
Get started with our Learn Subscription Plan that includes this course, PLUS:

  • 490 high impact technical, end user and learning & business management courses
  • 100% online self-paced courses
  • Course completion certificates
  • Live tech support and you will be assigned your personal Learning Concierge
  • 7-Day FREE Trial
    Then Billed
    $24.99
    Every Month Until Canceled
  • Start FREE Trial
Purchase As Individual Course
  • Self-Paced Online Content
  • Attend Course Any Day or Any Time
  • Reports & Statistics
  • Certificate Upon Completion
  • $495.00
    Self-Paced Learning
  • Enroll Now
Purchase For Teams
Team Pricing Available - Request A Quote Today!

  • Group Discounts & Private Training Available
  • Free Learning Management Center
  • Group Reporting & Tracking
  • Author / Publish Your Own Courses
  • Request Team Enrollment

This series covers everything you need to know about IS20 Security Controls. Students will learn about inventory of authorized and unauthorized devices, inventory of authorized and unauthorized software, secure configurations for hardware and software on laptops, workstations and servers, secure configurations for hardware network devices such as firewalls, routers and switches, boundary defense, maintenance, monitoring, and analysis of audit logs, application software security, controlled use of administrative privileges, controlled access based on need to know, continuous vulnerability assessment and remediation, account monitoring and control, malware defenses, limitation and control of network ports, protocols and services, wireless device control, data loss prevention, secure network engineering, penetration tests and red team exercises, incident response capability, data recovery capability, and security skills assessment and appropriate training to fill gaps.

Certification Details:

Becoming certified in Information Systems 20 Controls verifies that you have learned the important security controls and their methodologies as outlined by the US Department of Defense and other major players in the cyber security sector. You have an understanding of how attacks work and what needs to be done to prevent them. You are trained to improve security in networks by implementing the top 20 security controls, allowing you to prevent and detect. Those certified in IS20 Controlsare now prepared to be leaders of future security projects, because they will have a plan for exactly what needs to be done in securing a network.

More Information
Lab Access No
Learning Style Self-Paced Learning
Difficulty Intermediate
Course Duration 3 Hours
Language English
Write Your Own Review
You're reviewing:IS20 Security Controls
Your Rating