• LOGIN
  • No products in the basket.

Login

This IS20 Controls is designed to enables the IT security professionals to implement controls in their existing network(s) through highly effective and economical automation. The course is equally helpful for the enterprise management staff to effectively gauge the effectiveness of security controls implemented in their organizations.

This course is a comprehensive and essential course for security professionals who is working with sensitive information, and are responsible to ensure its security. The course covers proven general controls and methodologies that are used to execute and analyze the Top Twenty Most Critical Security Controls. This course allows the security professional to see how to implement controls in their existing network(s) through highly effective and economical automation. For management, this training is the best way to distinguish how you’ll assess whether these security controls are effectively being administered or if they are failing.

How is this qualification is delivered?

Our courses are taught entirely online, meaning you can access the materials wherever, whenever, at a pace that suits you, without formal deadlines or teaching schedules.

These can be accessed through any device with an internet connection. Our e-learning platform is optimised for use on mobile, tablet, laptops and desktop computers.

How is the course assessed?

Our IS20 Controls will ensure that you’re fully prepared for the exam. Successful completion of the exam – provided by the authorised awarding body – is a prerequisite to obtaining your qualification.

However you will be able to obtain a course completion certificate from St. Paul’s College upon completion of the course.

Course Curriculum

Inventory of Authorized and Unauthorized Devices
Inventory of Authorized and Unauthorized Devices FREE 00:06:00
Inventory of Authorized and Unauthorized Software
Inventory of Authorized and Unauthorized Software 00:06:00
Secure Configurations for Hardware and Software on Laptops, Workstations and Servers
Secure Configurations for Hardware and Software on Laptops, Workstations and Servers 00:11:00
Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches
Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches 00:13:00
Boundary Defense
Boundary Defense 00:09:00
Maintenance, Monitoring, and Analysis of Audit Logs
Maintenance, Monitoring, and Analysis of Audit Logs 00:09:00
Application Software Security
Application Software Security 00:14:00
Controlled Use of Administrative Privileges
Controlled Use of Administrative Privileges 00:09:00
Controlled Access Based on Need to Know
Controlled Access Based on Need to Know 00:06:00
Continuous Vulnerability Assessment and Remediation
Continuous Vulnerability Assessment and Remediation 00:10:00
Account Monitoring and Control
Account Monitoring and Control 00:10:00
Malware Defenses
Malware Defenses 00:10:00
Limitation and Control of Network Ports, Protocols and Services
Limitation and Control of Network Ports, Protocols and Services 00:07:00
Wireless Device Control
Wireless Device Control 00:14:00
Data Loss Prevention
Data Loss Prevention 00:09:00
Secure Network Engineering
Secure Network Engineering 00:06:00
Penetration Tests and Red Team Exercises
Penetration Tests and Red Team Exercises 00:11:00
Incident Response Capability
Incident Response Capability 00:07:00
Data Recovery Capability
Data Recovery Capability 00:06:00
Security Skills Assessment and Appropriate Training to Fill Gaps
Security Skills Assessment and Appropriate Training to Fill Gaps 00:08:00
Mock Exam
Mock Exam – IS20 Controls 00:20:00
Final Exam
Final Exam – IS20 Controls 00:20:00

Course Reviews

4.9

4.9
9 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE OR ALL COURSES FOR £69.99
  • £24.99
  • 1 year
  • Course Certificate
  • Number of Units20
  • Number of Quizzes2
  • 3 hours, 41 minutes
480 STUDENTS ENROLLED