IS20 Security Controls Mile2®’s vendor-neutral IS20 Controls certification course covers proven general controls and methodologies that are used to execute and analyze the Top Twenty Most Critical Security Controls. This course allows the security professional to see how to implement controls in their existing network(s) through highly effective and economical automation. For management, this training is the best way to distinguish how you’ll assess whether these security controls are effectively being administered or if they are falling short of industry standards. Nearly all organizations containing sensitive information are adopting and implementing the most critical security controls as the highest priority list. These controls were chosen by leading government and private organizations who are experts on how compromised networks/systems evolve and how to mitigate and prevent them from happening. These leading security experts chose the best of breed controls needed to block known incidents as well as alleviate any damage from successful attacks. Ultimately, the implementation of these Top 20 Controls will ensure best efforts to drastically decrease the overall cost of security while improving both the efficiency and effectiveness of it. The IS20 Security Controls exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consists of 100 multiple choice questions. The cost is $400 USD and must be purchased from Mile2.com. Electronic Book Ebook course material you can access on a computer, mobile or tablet Purchase Ebook Certification Exam Successfully pass the exam to earn your certification. Purchase Exam Exam Information The Certified Information Systems Security Officer exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD and must be purchased from Mile2.com. Request Information when this class will run (*) Required Fields First & Last Name(*) Please let us know your name. Email(*) Please let us know your email address. Phone Number(*) Invalid Phone Class Title(*) Invalid Input Key Data Course Title: Top 20 Information Systems Security Controls (Maps to SANS Top 20 Controls) Duration: 3 Days Language: English Class Format Options: Instructor-led classroom Instructor-led Online Training Prerequisites: Abasic understanding of networking and security technologies Student Materials: Student Workbook Student Lab Guide Certification Exams: Certified Virtualization and Cloud Principles, CompTIA Cloud+ CEUs: 40 Detailed Outline 0.Course Introduction I.Critical Control 1: Inventory of Authorized and Unauthorized Devices II. Critical Control 2: Inventory of Authorized and Unauthorized Software III. Critical Control 3: Secure Configurations for Hardware and Software on IV. Critical Control 4: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches V. Critical Control 5: Boundary Defense VI. Critical Control 6: Maintenance, Monitoring, and Analysis of Audit Logs Network Ports, Protocols, and Services VII. Critical Control 7: Application Software Security VII. Critical Control 8: Controlled Use of Administrative Privileges IX. Critical Control 9: Controlled Access Based on Need to KNow X. Critical Control 10: Continuous Vulnerability Assessment and Remediation XI. Critical Control 11: Account Monitoring and Control XII. Critical Control 12: Malware Defenses XIII. Critical Control 13: Limitation and Control of XIV. Critical Control 14: Wireless Device Control XV. Critical Control 15: Data Loss Prevention XVI. Critical Control 16: Secure Network Engineering XVII. Critical Control 17: Penetration Tests and Red Team Exercises XVIII. Critical Control 18: Incident Response Capability XIX. Critical Control 19: Data Recovery Capability XX. Critical Control 20: Security Skills Assesment and Appropriate Training to Fill Gaps Course Outline Who Should Attend? Information assurance managers/auditors System implementers/administrators Network security engineers IT administrators Auditors/auditees DoD personnel/contractors Federal agencies/clients Security vendors and consulting groups looking to stay current with frameworks for information assurance Upon Completion Upon completion, the IS20 Security Controls candidate will be able to not only competently take the IS20 Controls exam but will also have an understanding of how to implement the top 20 most critical controls in the workplace. Accreditations & Acknowledgements Mile2 is: ACCREDITED by the NSA CNSS 4011-4016 MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3) Get the Latest Cyber Security Certification Info Directly into Your Inbox We will never spam you.