IS20 Security Controls Course [CA]

Training by experienced instructors

Tracy Preston



100% Money Back Guarantee.

Condition Apply

This course covers everything you need to know about IS20 Security Controls. Participants will learn about inventory of authorized and unauthorized devices and software; secure configurations for hardware and software on laptops, workstations and servers, firewalls, routers and switches; boundary defense, maintenance, monitoring, and analysis of audit logs, application software security; controlled use of administrative privileges; continuous vulnerability assessment and remediation; account monitoring, control, malware defenses, limitation and control of network ports, protocols and services; wireless device control, data loss prevention, secure network engineering, penetration tests and red team exercises; incident response capability, data recovery capability; and security skills assessment and appropriate training to fill gaps.

Course Taught By: Tracy Preston

5 CEUs
Inventory of Authorized and Unauthorized Devices       6m
Secure Configurations for Hardware and Software on Laptops, Workstations and Servers                             12m
Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches   13m
Boundary Defense          9m
Maintenance, Monitoring, and Analysis of Audit Logs 9m
Application Software Security    14m
Controlled Use of Administrative Privileges 9m
Controlled Access Based on Need to Know          6m
Continuous Vulnerability Assessment and Remediation 10m
Account Monitoring and Control 10m
Malware Defenses 10m
Limitation and Control of Network Ports, Protocols and Services                7m
Wireless Device Control 14m
Data Loss Prevention 9m
Secure Network Engineering 6m
Penetration Tests and Red Team Exercises          11m
Incident Response Capability      7m
Data Recovery Capability 6m
Security Skills Assessment and Appropriate Training to Fill Gaps                 8m

Associate with us

Follow us

Toll Free