• LOGIN
  • No products in the cart.

IS20 Controls - Complete Video Training

4.9( 9 REVIEWS )
623 STUDENTS

Description:

This IS20 Controls – Complete Video Training covers proven general controls and methodologies that are used to execute and analyze the top twenty most critical security controls. Nowadays, nearly all organizations containing sensitive information are adopting and implementing the most critical security controls as the highest priority list. In this course you will learn about inventory of authorized and unauthorized devices, inventory of authorized and unauthorized software, secure configurations for hardware and software on laptops, workstations and servers, secure configurations for hardware network devices such as firewalls, routers and switches, boundary defense, maintenance, monitoring, and analysis of audit logs, application software security, controlled use of administrative privileges, controlled access based on need to know, continuous vulnerability assessment and remediation, account monitoring and control, limitation and control of network ports, secure network engineering, penetration tests and red team exercises, incident response capability, data recovery capability, security skills assessment and appropriate training to fill gaps, and more.

Benefits you will get?

  • Affordable, engaging & premium-quality e-learning study materials
  • Assessment through Tests and Quizzes and instant result
  • Internationally recognized accredited qualification
  • Access to course content on mobile, tablet or desktop from anywhere anytime
  • Personalized learning – Learn at your own pace, time and place
  • A vast array of fascinating subjects
  • Regularly updated contents
  • Dedicated support team working 24/7

Requirements:

  • Anyone with any academic background can enroll into this course.
  • A device with an active internet connection

Assessment:

We assess our learners through quizzes or multiple choice test. This test will be assessed automatically and immediately to give you an instant result.

Certification:

The PDF copy of Certificate of Completion can be claimed at the free of cost. If you need a hardcopy of this certificate, you have to pay an additional payment. The time for PDF certificate turnaround is 24 hours, and for the hardcopy, it is 3-7 working days.

Course Curriculum

Inventory of Authorized and Unauthorized Devices
Inventory of Authorized and Unauthorized Devices FREE 00:06:00
Inventory of Authorized and Unauthorized Software
Inventory of Authorized and Unauthorized Software 00:06:00
Secure Configurations for Hardware and Software on Laptops, Workstations and Servers
Secure Configurations for Hardware and Software on Laptops, Workstations and Servers 00:11:00
Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches
Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches 00:13:00
Boundary Defense
Boundary Defense 00:09:00
Maintenance, Monitoring, and Analysis of Audit Logs
Maintenance, Monitoring, and Analysis of Audit Logs 00:09:00
Application Software Security
Application Software Security 00:14:00
Controlled Use of Administrative Privileges
Controlled Use of Administrative Privileges 00:09:00
Controlled Access Based on Need to Know
Controlled Access Based on Need to Know 00:06:00
Continuous Vulnerability Assessment and Remediation
Continuous Vulnerability Assessment and Remediation 00:10:00
Account Monitoring and Control
Account Monitoring and Control 00:10:00
Malware Defenses
Malware Defenses 00:10:00
Limitation and Control of Network Ports, Protocols and Services
Limitation and Control of Network Ports, Protocols and Services 00:07:00
Wireless Device Control
Wireless Device Control 00:14:00
Data Loss Prevention
Data Loss Prevention 00:09:00
Secure Network Engineering
Secure Network Engineering 00:06:00
Penetration Tests and Red Team Exercises
Penetration Tests and Red Team Exercises 00:11:00
Incident Response Capability
Incident Response Capability 00:07:00
Data Recovery Capability
Data Recovery Capability 00:06:00
Security Skills Assessment and Appropriate Training to Fill Gaps
Security Skills Assessment and Appropriate Training to Fill Gaps 00:08:00
Mock Exam
Mock Exam- IS20 Controls – Complete Video Training 00:20:00
Final Exam
Final Exam- IS20 Controls – Complete Video Training 00:20:00

Course Reviews

4.9

4.9
9 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE

Instructors

623 STUDENTS ENROLLED

    30 DAYS MONEY BACK Guarantee

    Buy For Your team

    Get your team access to john’s top 1540+ courses anytime anywhere

    try john academy for business

    Our Course Awarding Bodies

    ACCREDITED BY

     

    OUR COURSE PARTNERS

    Have you any inquiry?

    • By submitting your information, you agree to the terms and conditions stated in our Privacy Policy

    © 2021 John Academy All Rights Reserved.