This IS20 Controls is designed to enables the IT security professionals to implement controls in their existing network(s) through highly effective and economical automation. The course is equally helpful for the enterprise management staff to effectively gauge the effectiveness of security controls implemented in their organizations.
This course is a comprehensive and essential course for security professionals who is working with sensitive information, and are responsible to ensure its security. The course covers proven general controls and methodologies that are used to execute and analyze the Top Twenty Most Critical Security Controls. This course allows the security professional to see how to implement controls in their existing network(s) through highly effective and economical automation. For management, this training is the best way to distinguish how you’ll assess whether these security controls are effectively being administered or if they are failing.
How is this qualification is delivered?
Our courses are taught entirely online, meaning you can access the materials wherever, whenever, at a pace that suits you, without formal deadlines or teaching schedules.
These can be accessed through any device with an internet connection. Our e-learning platform is optimised for use on mobile, tablet, laptops and desktop computers.
How is the course assessed?
Our IS20 Controls will ensure that you’re fully prepared for the exam. Successful completion of the exam – provided by the authorised awarding body – is a prerequisite to obtaining your qualification.
However you will be able to obtain a course completion certificate from St. Paul’s College upon completion of the course.
Course Curriculum
Inventory of Authorized and Unauthorized Devices | |||
Inventory of Authorized and Unauthorized Devices | FREE | 00:06:00 | |
Inventory of Authorized and Unauthorized Software | |||
Inventory of Authorized and Unauthorized Software | 00:06:00 | ||
Secure Configurations for Hardware and Software on Laptops, Workstations and Servers | |||
Secure Configurations for Hardware and Software on Laptops, Workstations and Servers | 00:11:00 | ||
Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches | |||
Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches | 00:13:00 | ||
Boundary Defense | |||
Boundary Defense | 00:09:00 | ||
Maintenance, Monitoring, and Analysis of Audit Logs | |||
Maintenance, Monitoring, and Analysis of Audit Logs | 00:09:00 | ||
Application Software Security | |||
Application Software Security | 00:14:00 | ||
Controlled Use of Administrative Privileges | |||
Controlled Use of Administrative Privileges | 00:09:00 | ||
Controlled Access Based on Need to Know | |||
Controlled Access Based on Need to Know | 00:06:00 | ||
Continuous Vulnerability Assessment and Remediation | |||
Continuous Vulnerability Assessment and Remediation | 00:10:00 | ||
Account Monitoring and Control | |||
Account Monitoring and Control | 00:10:00 | ||
Malware Defenses | |||
Malware Defenses | 00:10:00 | ||
Limitation and Control of Network Ports, Protocols and Services | |||
Limitation and Control of Network Ports, Protocols and Services | 00:07:00 | ||
Wireless Device Control | |||
Wireless Device Control | 00:14:00 | ||
Data Loss Prevention | |||
Data Loss Prevention | 00:09:00 | ||
Secure Network Engineering | |||
Secure Network Engineering | 00:06:00 | ||
Penetration Tests and Red Team Exercises | |||
Penetration Tests and Red Team Exercises | 00:11:00 | ||
Incident Response Capability | |||
Incident Response Capability | 00:07:00 | ||
Data Recovery Capability | |||
Data Recovery Capability | 00:06:00 | ||
Security Skills Assessment and Appropriate Training to Fill Gaps | |||
Security Skills Assessment and Appropriate Training to Fill Gaps | 00:08:00 | ||
Mock Exam | |||
Mock Exam – IS20 Controls | 00:20:00 | ||
Final Exam | |||
Final Exam – IS20 Controls | 00:20:00 |
Course Reviews
No Reviews found for this course.