Certificate In IS20 Security Controls Online Course

the effectiveness of security controls implemented in their organizations.

Certificate In IS20 Security Controls Online Course

NOW ONLY

AU$99

Save AU$500 (83%)
OFF RRP AU$599
Get Info Pack

Learn the effectiveness of security controls implemented in their organizations

The IS20 Security Controls training course is based on the official Mile2’s vendor neutral IS20 Controls certification objectives and covers the proven general controls and methodologies that are used to execute and analyze the twenty most critical security controls. This course enables the IT security professionals to implement controls in their existing network(s) through highly effective and economical automation. The course is equally helpful for the enterprise management staff to effectively gauge the effectiveness of security controls implemented in their organizations.

This training course is a comprehensive and essential course for security professionals working with sensitive information and are responsible to ensure its security. The course focuses on the twenty most critical controls suggested by the leading government and private organizations. The implementation of these Top 20 Controls will ensure best efforts to drastically decrease the overall cost of security while improving both the efficiency and effectiveness of it.

Exam Information

The exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consists of 100 multiple choice questions. 

Course Fast Facts:

  1. Learn the fundamentals of IS20 Security Controls
  2. Comprehensive 20 module Accredited Certificate In IS20 Security Controls Online Course
  3. Study along with simple instructions & demonstrations
  4. Written and developed by leading IS20 Security Controls experts
  5. Receive one-on-one online help & support
  6. Unlimited, lifetime access to online course
  7. Certificate of completion
  8. Study at your own pace with no rigid class timetables, 24/7 from any computer or smart device

Course Delivery

Courses are accessed online  by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. 

Recognition & Accreditation

All students who complete this course, receive a certificate of completion and will be issued a certificate via email.

Inventory of Authorized and Unauthorized Devices

  • Inventory of Authorized and Unauthorized Devices 

Inventory of Authorized and Unauthorized Software

  • Inventory of Authorized and Unauthorized Software 

Secure Configurations for Hardware and Software on Laptops,Workstations & Server

  • Secure Configurations for Hardware and Software on Laptops, Workstations& Server 

Secure Configurations for Hardware Network Devices Firewalls, Routers and Switch

  • Secure Configurations for Hardware Network Devices such as Firewalls, Routers an 

Boundary Defense

  • Boundary Defense 

Maintenance, Monitoring, and Analysis of Audit Logs

  • Maintenance, Monitoring, and Analysis of Audit Logs 

Application Software Security

  • Application Software Security 

Controlled Use of Administrative Privileges

  • Controlled Use of Administrative Privileges 

Controlled Access Based on Need to Know

  • Controlled Access Based on Need to Know 

Continuous Vulnerability Assessment and Remediation

  • Continuous Vulnerability Assessment and Remediation 

Account Monitoring and Control

  • Account Monitoring and Control 

Malware Defenses

  • Malware Defenses 

Limitation and Control of Network Ports, Protocols and Services

  • Limitation and Control of Network Ports, Protocols and Services 

Wireless Device Control

  • Wireless Device Control 

Data Loss Prevention

  • Data Loss Prevention

Secure Network Engineering

  • Secure Network Engineering 

Penetration Tests and Red Team Exercises

  • Penetration Tests and Red Team Exercises 

Incident Response Capability

  • Incident Response Capability 

Data Recovery Capability

  • Data Recovery Capability

Security Skills Assessment and Appropriate Training to Fill Gaps

  • Security Skills Assessment and Appropriate Training to Fill Gaps 

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

About this Course

Learn the effectiveness of security controls implemented in their organizations

The IS20 Security Controls training course is based on the official Mile2’s vendor neutral IS20 Controls certification objectives and covers the proven general controls and methodologies that are used to execute and analyze the twenty most critical security controls. This course enables the IT security professionals to implement controls in their existing network(s) through highly effective and economical automation. The course is equally helpful for the enterprise management staff to effectively gauge the effectiveness of security controls implemented in their organizations.

This training course is a comprehensive and essential course for security professionals working with sensitive information and are responsible to ensure its security. The course focuses on the twenty most critical controls suggested by the leading government and private organizations. The implementation of these Top 20 Controls will ensure best efforts to drastically decrease the overall cost of security while improving both the efficiency and effectiveness of it.

Exam Information

The exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consists of 100 multiple choice questions. 

Course Fast Facts:

  1. Learn the fundamentals of IS20 Security Controls
  2. Comprehensive 20 module Accredited Certificate In IS20 Security Controls Online Course
  3. Study along with simple instructions & demonstrations
  4. Written and developed by leading IS20 Security Controls experts
  5. Receive one-on-one online help & support
  6. Unlimited, lifetime access to online course
  7. Certificate of completion
  8. Study at your own pace with no rigid class timetables, 24/7 from any computer or smart device

Course Delivery

Courses are accessed online  by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. 

Recognition & Accreditation

All students who complete this course, receive a certificate of completion and will be issued a certificate via email.

Inventory of Authorized and Unauthorized Devices

  • Inventory of Authorized and Unauthorized Devices 

Inventory of Authorized and Unauthorized Software

  • Inventory of Authorized and Unauthorized Software 

Secure Configurations for Hardware and Software on Laptops,Workstations & Server

  • Secure Configurations for Hardware and Software on Laptops, Workstations& Server 

Secure Configurations for Hardware Network Devices Firewalls, Routers and Switch

  • Secure Configurations for Hardware Network Devices such as Firewalls, Routers an 

Boundary Defense

  • Boundary Defense 

Maintenance, Monitoring, and Analysis of Audit Logs

  • Maintenance, Monitoring, and Analysis of Audit Logs 

Application Software Security

  • Application Software Security 

Controlled Use of Administrative Privileges

  • Controlled Use of Administrative Privileges 

Controlled Access Based on Need to Know

  • Controlled Access Based on Need to Know 

Continuous Vulnerability Assessment and Remediation

  • Continuous Vulnerability Assessment and Remediation 

Account Monitoring and Control

  • Account Monitoring and Control 

Malware Defenses

  • Malware Defenses 

Limitation and Control of Network Ports, Protocols and Services

  • Limitation and Control of Network Ports, Protocols and Services 

Wireless Device Control

  • Wireless Device Control 

Data Loss Prevention

  • Data Loss Prevention

Secure Network Engineering

  • Secure Network Engineering 

Penetration Tests and Red Team Exercises

  • Penetration Tests and Red Team Exercises 

Incident Response Capability

  • Incident Response Capability 

Data Recovery Capability

  • Data Recovery Capability

Security Skills Assessment and Appropriate Training to Fill Gaps

  • Security Skills Assessment and Appropriate Training to Fill Gaps 

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

We provide a 7 Day Money Back Refund on all Courses

Now Only AU$99 Save AU$500 (83%)
OFF RRP AU$599
Delivery Method Online
Get Info Pack

Special Offer

 

Receive The Personal Success Training Program FREE, When You Purchase This Course - Limited Time Remaining!  (Value $600)

 

The Personal Success Training Program Helps You Stay Focused To Achieve Your Goals!
Benefits:
  • How to layout a Success Plan.
  • Get where you want to be in life.
  • How to unclutter your mind to succeed.
  • Achieve your dreams using your imagination.
  • How to have faith in yourself.
Features:
  • 12 month online access,  24/7 anywhere.
  • Complement your individual course purchase.
  • Internationally recognized by the IAOTS.
  • Thousands of positive reviews.
  • Limited Time Offer - Ends Soon.
 

Share this course

Course Summary

Course ID No.: 009SRIS20SC
Delivery Mode: Online
Course Access: Unlimited lifetime
Tutor Support: Yes
Time required: Study at your own pace
Course Duration: 3 Hours
Assessments: Yes
Qualification: Certificate of Completion

Popular Courses and Bundles

Get a FREE Career Planner