IS18 Controls

The IS18 Controls – IS18 certification course is intended for anyone interested in learning effective information systems governance and management. This 4-day training course focuses on the implementation and analysis of the IS18 Top Controls. These controls have been identified as critical by leading government and private organizations with expertise in understanding attack techniques and mitigating risks. They are designed to prevent known attacks and minimize the impact of successful attacks. By adopting the IS18 Top Controls, organizations can enhance the security of their sensitive information. This training course equips security professionals with the tools and methodologies necessary to execute and assess these controls within their existing network infrastructure. Automation is emphasized as a highly effective and cost-efficient approach to implementing these controls.

Retail Price: $2,000.00

Next Date: Request Date

Course Days: 4


Request a Date

Request Custom Course


Upon Completion

Upon completion, the IS18 Security Controls candidate will be able to competently take the IS18 Controls exam and understand how to implement the top 18 most critical controls in the workplace. 

 

Who Should Attend

  • Information Assurance Managers/Auditors 
  • System Implementers 
  • IT Administrators 
  • Auditors 
  • Federal Agencies 
  • Security Vendors and Consulting Groups 

Outline:

 

Module 01: Introduction 

Module 02: Critical Control 01, Inventory and Control of Enterprise Assets 

Module 03: Critical Control 02, Inventory and Control of Software Assets 

Module 04: Critical Control 03, Data Protection 

Module 05: Critical Control 04, Secure Configuration of Enterprise Assets and Software 

Module 06: Critical Control 05, Account Management 

Module 07: Critical Control 06, Access Control Management 

Module 08: Critical Control 07, Continuous Vulnerability Management 

Module 09: Critical Control 08, Audit Log Management 

Module 10: Critical Control 09, Email and Web Browser Protection 

Module 11: Critical Control 10, Malware Defenses 

Module 12: Critical Control 11, Data Recovery 

Module 13: Critical Control 12, Network Infrastructure Management 

Module 14: Critical Control 13, Network Monitoring and Defense 

Module 15: Critical Control 14, Security Awareness and Skills Training 

Module 16: Critical Control 15, Service Provider Management 

Module 17: Critical Control 16, Applications Software Security 

Module 18: Critical Control 17, Incident Response Management 

Module 19: Critical Control 18: Penetration Testing 



Sorry! It looks like we haven’t updated our dates for the class you selected yet. There’s a quick way to find out. Contact us at 502.265.3057 or email info@training4it.com


Request a Date