IS18 Controls
Upon Completion
Upon completion, the IS18 Security Controls candidate will be able to competently take the IS18 Controls exam and understand how to implement the top 18 most critical controls in the workplace.
Who Should Attend
- Information Assurance Managers/Auditors
- System Implementers
- IT Administrators
- Auditors
- Federal Agencies
- Security Vendors and Consulting Groups
Outline:
Module 01: Introduction
Module 02: Critical Control 01, Inventory and Control of Enterprise Assets
Module 03: Critical Control 02, Inventory and Control of Software Assets
Module 04: Critical Control 03, Data Protection
Module 05: Critical Control 04, Secure Configuration of Enterprise Assets and Software
Module 06: Critical Control 05, Account Management
Module 07: Critical Control 06, Access Control Management
Module 08: Critical Control 07, Continuous Vulnerability Management
Module 09: Critical Control 08, Audit Log Management
Module 10: Critical Control 09, Email and Web Browser Protection
Module 11: Critical Control 10, Malware Defenses
Module 12: Critical Control 11, Data Recovery
Module 13: Critical Control 12, Network Infrastructure Management
Module 14: Critical Control 13, Network Monitoring and Defense
Module 15: Critical Control 14, Security Awareness and Skills Training
Module 16: Critical Control 15, Service Provider Management
Module 17: Critical Control 16, Applications Software Security
Module 18: Critical Control 17, Incident Response Management
Module 19: Critical Control 18: Penetration Testing
Sorry! It looks like we haven’t updated our dates for the class you selected yet. There’s a quick way to find out. Contact us at 502.265.3057 or email info@training4it.com
Request a Date