IS20: IS20 Security Controls3 Training in Conroe

Enroll in or hire us to teach our IS20: IS20 Security Controls3 class in Conroe, Texas by calling us @303.377.6176. Like all HSG classes, IS20: IS20 Security Controls3 may be offered either onsite or via instructor led virtual training. Consider looking at our public training schedule to see if it is scheduled: Public Training Classes
Provided there are enough attendees, IS20: IS20 Security Controls3 may be taught at one of our local training facilities.
We offer private customized training for groups of 3 or more attendees.

Course Description

 
Mile2â??s IS 20 Controls course covers proven general controls and methodologies that are used to execute and analyze the Top Twenty Most Critical Security Controls. This course allows the security professional to see how to implement controls in their existing network(s) though highly effective and economical automation. For management, this training is the best way to distinguish how youâ??ll assess whether these security controls are effectively being administered or if they are falling short to industry standards.
Course Length: 3 Days
Course Tuition: $2290 (US)

Prerequisites

A basic understanding of networking and security technologies

Course Outline

 
  • Critical Control 1: Inventory of Authorized and Unauthorized Devices
  • Critical Control 2: Inventory of Authorized and Unauthorized Software
  • Critical Control 3: Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers
  • Critical Control 4: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
  • Critical Control 5: Boundary Defence
  • Critical Control 6: Maintenance, Monitoring, and Analysis of Audit Logs
  • Critical Control 7: Application Software Security
  • Critical Control 8: Controlled Use of Administrative Privileges
  • Critical Control 9: Controlled Access Based on Need to Know
  • Critical Control 10: Continuous Vulnerability Assessment and Remediation
  • Critical Control 11: Account Monitoring and Control
  • Critical Control 12: Malware Defences
  • Critical Control 13: Limitation and Control of Network Ports, Protocols, and Services
  • Critical Control 14: Wireless Device Control
  • Critical Control 15: Data Loss Prevention
  • Critical Control 16: Secure Network Engineering
  • Critical Control 17: Penetration Tests and Red Team Exercises
  • Critical Control 18: Incident Response Capability
  • Critical Control 19: Data Recovery Capability
  • Critical Control 20: Security Skills Assessment and Appropriate Training to Fill Gaps

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.