• Homepage
  • >
  • IS20 Security Controls Mile2 (IS20 Controls self-study)

IS20 Security Controls Mile2 (IS20 Controls self-study)

IS20 Security Controls Mile2 (IS20 Controls self-study)
0,0 rating based on 12.345 ratings
Overall rating: 0 out of 5 based on 0 reviews.

Mile2®’s vendor-neutral IS20 Controls certification course covers proven general controls and methodologies that are used to execute and analyze the Top Twenty Most Critical Security Controls. This course allows the security professional to see how to implement controls in their existing network(s) through highly effective and economical automation. For management, this training is the best way to distinguish how you’ll assess whether these security controls are effectively being administered or if they are falling short of industry standards. Nearly all organizations containing sensitive information are adopting and implementing the most critical security controls as the highest priority list. 

Wat leer je?

Upon completion, the IS20 Security Controls candidate will be able to not only competently take the IS20 Controls exam but will also have an understanding of how to implement the top 20 most critical controls in the workplace.

Trainingsvorm

995.00

(excl. BTW)

Trainingsduur

365 dagen

Afronding

Certificaat van deelname

Locatie

Klantlocatie

Welke voorkennis heb je nodig?

A basic understanding of networking and security technologies

Kom je er niet uit?

Neem dan contact op met onze klanten service voor studieadvies of een training op maat.

 

Trainingsdata

Startdatum

Trainingsvorm

Locatie

Duur

Prijs

datum:

E-Learning

Klantlocatie

365 dagen

995.00

datum:

In company

Waarom Startel?

Persoonlijke
aanpak
Ervaren
trainers
Aanbod
op maat
Klassikaal en e-learning
mogelijkheden

Het programma

0.Course Introduction


I.Critical Control 1: Inventory of Authorized and Unauthorized Devices


II. Critical Control 2: Inventory of Authorized and Unauthorized Software


III. Critical Control 3: Secure Configurations for Hardware and Software on


IV. Critical Control 4: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches


V. Critical Control 5: Boundary Defense


VI. Critical Control 6: Maintenance, Monitoring, and Analysis of Audit Logs Network Ports, Protocols, and Services


VII. Critical Control 7: Application Software Security


VII. Critical Control 8: Controlled Use of Administrative Privileges


IX. Critical Control 9: Controlled Access Based on Need to KNow


X. Critical Control 10: Continuous Vulnerability Assessment and Remediation


XI. Critical Control 11: Account Monitoring and Control


XII. Critical Control 12: Malware Defenses


XIII. Critical Control 13: Limitation and Control of


XIV. Critical Control 14: Wireless Device Control


XV. Critical Control 15: Data Loss Prevention


XVI. Critical Control 16: Secure Network Engineering


XVII. Critical Control 17: Penetration Tests and Red Team Exercises


XVIII. Critical Control 18: Incident Response Capability


XIX. Critical Control 19: Data Recovery Capability


XX. Critical Control 20: Security Skills Assesment and Appropriate Training to Fill Gaps

Hoe maken we het persoonlijk?

Bij Startel is persoonlijk ook écht persoonlijk. Om de best passende trainingen te geven starten we met het belangrijkste ingrediënt: jou.

  1. We starten altijd met een intake om jou te leren kennen.
  2. We passen de Training aan de hand van jouw ambitie en doelen aan.
  3. We kijken ook naar jouw persoonlijke situatie om de lesstof zo praktisch mogelijk te maken.

Wat zeggen anderen?

IS20 Security Controls Mile2 (IS20 Controls self-study)
0,0 rating based on 12.345 ratings
Overall rating: 0 out of 5 based on 0 reviews.

Laat een review achter

Name
Email
Rating
Review Content
.
BiSL Next

BiSL Next is de volgende generatie van het framework voor Business Informatie Management. Business Informatie Management (BIM) is het managementdomein dat verantwoordelijk is

Lees verder »

Contact formulier

Op de hoogte blijven van de nieuwste trainingen?

Schrijf je in voor onze nieuwsbrief!

E-mailadres