IS20 Security Controls Mile2 (IS20 Controls self-study)

Type product
Logo van StarTel bv
Opleiderscore: starstarstarstarstar_half 8,9 StarTel bv heeft een gemiddelde beoordeling van 8,9 (uit 28 ervaringen)

Tip: meer info over het programma, prijs, en inschrijven? Download de brochure!

Beschrijving

StarTel in Drachten verzorgt al ruim 20 jaar ICT opleidingen in Nederland en Belgie. 

Algemene omschrijving

Mile2®’s vendor-neutral IS20 Controls certification course covers proven general controls and methodologies that are used to execute and analyze the Top Twenty Most Critical Security Controls. This course allows the security professional to see how to implement controls in their existing network(s) through highly effective and economical automation. For management, this training is the best way to distinguish how you’ll assess whether these security controls are effectively being administered or if they are falling short of industry standards. Nearly all organizations containing sensitive information are adopting and implementing the most critical security controls as t…

Lees de volledige beschrijving

Veelgestelde vragen

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Nog niet gevonden wat je zocht? Bekijk deze onderwerpen: IT Beveiliging / Security, Ethical Hacking, IT Management & Strategie, Cyber Security en Penetration testing.

StarTel in Drachten verzorgt al ruim 20 jaar ICT opleidingen in Nederland en Belgie. 

Algemene omschrijving

Mile2®’s vendor-neutral IS20 Controls certification course covers proven general controls and methodologies that are used to execute and analyze the Top Twenty Most Critical Security Controls. This course allows the security professional to see how to implement controls in their existing network(s) through highly effective and economical automation. For management, this training is the best way to distinguish how you’ll assess whether these security controls are effectively being administered or if they are falling short of industry standards. Nearly all organizations containing sensitive information are adopting and implementing the most critical security controls as the highest priority list. 

Doelgroep

  • Information assurance managers/auditors
  • System implementers/administrators
  • Network security engineers
  • IT administrators
  •  Auditors/auditees
  • DoD personnel/contractors
  • Federal agencies/clients
  • Security vendors and consulting groups looking to stay current with frameworks for information assurance

Leerdoelen

Upon completion, the IS20 Security Controls candidate will be able to not only competently take the IS20 Controls exam but will also have an understanding of how to implement the top 20 most critical controls in the workplace.

Voorkennis

A basic understanding of networking and security technologies.

Onderwerpen

0.Course Introduction

I.Critical Control 1: Inventory of Authorized and Unauthorized Devices

II. Critical Control 2: Inventory of Authorized and Unauthorized Software

III. Critical Control 3: Secure Configurations for Hardware and Software on

IV. Critical Control 4: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches

V. Critical Control 5: Boundary Defense

VI. Critical Control 6: Maintenance, Monitoring, and Analysis of Audit Logs Network Ports, Protocols, and Services

VII. Critical Control 7: Application Software Security

VII. Critical Control 8: Controlled Use of Administrative Privileges

IX. Critical Control 9: Controlled Access Based on Need to KNow

X. Critical Control 10: Continuous Vulnerability Assessment and Remediation

XI. Critical Control 11: Account Monitoring and Control

XII. Critical Control 12: Malware Defenses

XIII. Critical Control 13: Limitation and Control of

XIV. Critical Control 14: Wireless Device Control

XV. Critical Control 15: Data Loss Prevention

XVI. Critical Control 16: Secure Network Engineering

XVII. Critical Control 17: Penetration Tests and Red Team Exercises

XVIII. Critical Control 18: Incident Response Capability

XIX. Critical Control 19: Data Recovery Capability

XX. Critical Control 20: Security Skills Assesment and Appropriate Training to Fill Gaps

Blijf op de hoogte van nieuwe ervaringen

Er zijn nog geen ervaringen.

Deel je ervaring

Heb je ervaring met deze cursus? Deel je ervaring en help anderen kiezen. Als dank voor de moeite doneert Springest € 1,- aan Stichting Edukans.

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Download gratis en vrijblijvend de informatiebrochure

Aanhef
(optioneel)
(optioneel)
(optioneel)
(optioneel)
(optioneel)

Heb je nog vragen?

(optioneel)
We slaan je gegevens op om je via e-mail en evt. telefoon verder te helpen.
Meer info vind je in ons privacybeleid.