Certification: IS20 Information Systems 20 Controls - Security Controls

Category
Security
Level
Advanced
Lessons
39
Duration
3h 03m 45s
Last Updated: 2018-06-19
This training path covers everything you need to know about IS20 Security Controls. Participants will learn about inventory of authorized and unauthorized devices, inventory of authorized and unauthorized software, secure configurations for hardware and software on laptops, workstations and servers, secure configurations for hardware network devices such as firewalls, routers and switches, boundary defense, maintenance, and monitoring and analysis of audit logs. They will also learn about application software security, the controlled use of administrative privileges, controlled access based on "need to know", continuous vulnerability assessment and remediation, account monitoring and control, malware defenses, limitation and control of network ports, and protocols and services. Also included is instruction on wireless device control, data loss prevention, secure network engineering, penetration tests and red team exercises, incident response capability, data recovery capability, security skills assessment, and appropriate training to fill gaps.

Career Path: Professional roles include, but at not limited to Security Consultant/Analyst, Penetration Tester, Security Forensics Experts, and Network Security Engineer.
Becoming certified in Information Systems 20 Controls verifies that you have learned the important security controls and their methodologies as outlined by the U.S. Department of Defense and other major players in the cyber security sector. You have an understanding of how attacks work and what needs to be done to prevent them. You are trained to improve security in networks by implementing the top 20 security controls, allowing you to prevent and detect. Those certified in IS20 Controls are now prepared to be leaders of future security projects, because they will have a plan for exactly what needs to be done to secure a network.

Certification Exam Details:
Learn more about this certification exam.
Category
Security
Level
Advanced
Lessons
39
Duration
3h 03m 45s
IS20 Module 01 - Inventory of Authorized and Unauthorized Devices
Inventory of Authorized and Unauthorized Devices
2 lessons6m 08sCompleted 0 / 2
IS20 Module 02 - Inventory of Authorized and Unauthorized Software
IS20 Module 03 - Secure Configurations on Laptops, Workstations and Servers
IS20 Module 04 - Secure Configurations for Hardware Network Devices
IS20 Module 05 - Boundary Defense
IS20 Module 06 - Maintenance, Monitoring, and Analysis of Audit Logs
IS20 Module 07 - Application Software Security
IS20 Module 08 - Controlled Use of Administrative Privileges
IS20 Module 09 - Controlled Access Based on Need to Know
IS20 Module 10 - Continuous Vulnerability Assessment and Remediation
IS20 Module 11 - Account Monitoring and Control
IS20 Module 12 - Malware Defenses
IS20 Module 13 - Limitation and Control of Network Ports, Protocols and Services
IS20 Module 14 - Wireless Device Control
IS20 Module 15 - Data Loss Prevention
IS20 Module 16 - Secure Network Engineering
IS20 Module 17 - Penetration Tests and Red Team Exercises
IS20 Module 18 - Incident Response Capability
IS20 Module 19 - Data Recovery Capability
IS20 Module 20 - Security Skills Assessment and Appropriate Training to Fill Gaps
Tracy Preston
I’ve been in network and information assurance in both the corporate and government agencies since 1995. I have secret military clearance and have earned over 20 industry-recognized certifications that include CISSP, C)ISSO, C)PTE, C)DFE, ISO 27001, MCSE, CCNP, CEH, CHFI, Comptia A+, Network+, and Security+. I’m an expert in Cyber security and Cisco Networking, as well as the ISO 27001 & 8570 DOD standards. I’m a mile2® Master instructor and curriculum developer.
Tracy PrestonInstructor and Curriculum Developer
Other Courses by Tracy Preston