• LOGIN
  • No products in the basket.

IS20 Controls - Complete Video Training

4.9( 9 REVIEWS )
477 STUDENTS

Description:

This IS20 Controls – Complete Video Training covers proven general controls and methodologies that are used to execute and analyze the top twenty most critical security controls. Nowadays nearly all organizations containing sensitive information are adopting and implementing the most critical security controls as the highest priority list. In this course you will learn about inventory of authorized and unauthorized devices, inventory of authorized and unauthorized software, secure configurations for hardware and software on laptops, workstations and servers, secure configurations for hardware network devices such as firewalls, routers and switches, boundary defense, maintenance, monitoring, and analysis of audit logs, application software security, controlled use of administrative privileges, controlled access based on need to know, continuous vulnerability assessment and remediation, account monitoring and control, limitation and control of network ports, secure network engineering, penetration tests and red team exercises, incident response capability, data recovery capability, security skills assessment and appropriate training to fill gaps, and more.

Assessment:

  • At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not.
  • Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam.

Certification:

  • After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement.
  • Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24.

Who is this Course for?

IS20 Controls – Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills.

As there is no experience and qualification required for this course, it is available for all students from any academic background.

Requirements

Our IS20 Controls – Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.

Career Path

After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.

Course Curriculum

Inventory of Authorized and Unauthorized Devices
Inventory of Authorized and Unauthorized Devices FREE 00:06:00
Inventory of Authorized and Unauthorized Software
Inventory of Authorized and Unauthorized Software 00:06:00
Secure Configurations for Hardware and Software on Laptops, Workstations and Servers
Secure Configurations for Hardware and Software on Laptops, Workstations and Servers 00:11:00
Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches
Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches 00:13:00
Boundary Defense
Boundary Defense 00:09:00
Maintenance, Monitoring, and Analysis of Audit Logs
Maintenance, Monitoring, and Analysis of Audit Logs 00:09:00
Application Software Security
Application Software Security 00:14:00
Controlled Use of Administrative Privileges
Controlled Use of Administrative Privileges 00:09:00
Controlled Access Based on Need to Know
Controlled Access Based on Need to Know 00:06:00
Continuous Vulnerability Assessment and Remediation
Continuous Vulnerability Assessment and Remediation 00:10:00
Account Monitoring and Control
Account Monitoring and Control 00:10:00
Malware Defenses
Malware Defenses 00:10:00
Limitation and Control of Network Ports, Protocols and Services
Limitation and Control of Network Ports, Protocols and Services 00:07:00
Wireless Device Control
Wireless Device Control 00:14:00
Data Loss Prevention
Data Loss Prevention 00:09:00
Secure Network Engineering
Secure Network Engineering 00:06:00
Penetration Tests and Red Team Exercises
Penetration Tests and Red Team Exercises 00:11:00
Incident Response Capability
Incident Response Capability 00:07:00
Data Recovery Capability
Data Recovery Capability 00:06:00
Security Skills Assessment and Appropriate Training to Fill Gaps
Security Skills Assessment and Appropriate Training to Fill Gaps 00:08:00
Mock Exam
Mock Exam- IS20 Controls – Complete Video Training 00:20:00
Final Exam
Final Exam- IS20 Controls – Complete Video Training 00:20:00

Course Reviews

4.9

4.9
9 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE ...

Instructors

477 STUDENTS ENROLLED

    14 DAYS MONEY BACK Guarantee

    Buy For Your team

    Get your team access to john’s top 1540+ courses anytime anywhere

    try john academy for business

    Our Course Awarding Bodies

    ACCREDITED BY

    OUR COURSE PARTNERS

    Have an enquiry?

    • By submitting your information, you agree to the terms and conditions stated in our Privacy Policy

    © John Academy.

    [Live Classes]
    [Live Classes]
    [Live]
    [Live]