IS20 Security Controls
Nearly all organizations containing sensitive information are adopting and implementing the most critical security controlsas the highest priority list.These controls were chosen by leading government and private organizations who are experts on how compromised networks/systemsevolveand how to mitigate and prevent them from happening. These leading security experts chose the best of breed controls needed to block known incidents as well as alleviate any damage from successful attacks. Ultimately, the implementation of these Top 20 Controlswill ensure best efforts to drastically decrease the overall cost of security while improving both the efficiency and effectiveness of it.
WHO SHOULD ATTEND?
- Information assurance managers/auditors
- System implementers/administrators
- Network security engineers
- IT administrators
- Auditors/auditees
- DoD personnel/contractors
- Federal agencies/clients
- Security vendors and consulting groups looking to stay current with frameworks for information assurance
UPON COMPLETION
Upon completion, the IS20 Security Controlscandidate will be able to not only competently take the IS20 Controlsexambut will also have an understanding of how to implement the top 20 most critical controls in the work place.
Outline
0.Course Introduction
I.Critical Control 1: Inventory of Authorized and Unauthorized Devices
II. Critical Control 2: Inventory of Authorized and Unauthorized Software
III. Critical Control 3: Secure Configurations for Hardware and Software on
IV. Critical Control 4: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
V. Critical Control 5: Boundary Defense
VI. Critical Control 6: Maintenance, Monitoring, and Analysis of Audit Logs Network Ports, Protocols, and Services
VII. Critical Control 7: Application Software Security
VII. Critical Control 8: Controlled Use of Administrative Privileges
IX. Critical Control 9: Controlled Access Based on Need to KNow
X. Critical Control 10: Continuous Vulnerability Assessment and Remediation
XI. Critical Control 11: Account Monitoring and Control
XII. Critical Control 12: Malware Defenses
XIII. Critical Control 13: Limitation and Control of
XIV. Critical Control 14: Wireless Device Control
XV. Critical Control 15: Data Loss Prevention
XVI. Critical Control 16: Secure Network Engineering
XVII. Critical Control 17: Penetration Tests and Red Team Exercises
XVIII. Critical Control 18: Incident Response Capability
XIX. Critical Control 19: Data Recovery Capability
XX. Critical Control 20: Security Skills Assesment and Appropriate Training to Fill Gaps
Sorry! It looks like we haven’t updated our dates for the class you selected yet. There’s a quick way to find out. Contact us at 502.265.3057 or email info@training4it.com
Request a Date