[vc_row][vc_column][vc_column_text]
Benefits You will get
- Affordable, engaging & premium-quality e-learning study materials
- Assessment through Tests and Quizzes and instant result
- Internationally recognized accredited qualification
- Dedicated support team working 24/7
- Access to course content on mobile, tablet or desktop from anywhere anytime
- Personalized learning – Learn at your own pace, time and place
- A vast array of fascinating subjects
- Regularly updated contents
Description
This IS20 Controls – Complete Video Training covers proven general controls and methodologies that are used to execute and analyze the top twenty most critical security controls. Nowadays, nearly all organizations containing sensitive information are adopting and implementing the most critical security controls as the highest priority list. In this course you will learn about inventory of authorized and unauthorized devices, inventory of authorized and unauthorized software, secure configurations for hardware and software on laptops, workstations and servers, secure configurations for hardware network devices such as firewalls, routers and switches, boundary defense, maintenance, monitoring, and analysis of audit logs, application software security, controlled use of administrative privileges, controlled access based on need to know, continuous vulnerability assessment and remediation, account monitoring and control, limitation and control of network ports, secure network engineering, penetration tests and red team exercises, incident response capability, data recovery capability, security skills assessment and appropriate training to fill gaps, and more.
Requirements:
- Anyone with any academic background can enroll into this course.
- A device with an active internet connection
Assesment:
We assess our learners through quizzes or multiple choice test. This test will be assessed automatically and immediately to give you an instant result.
Certification:
The PDF copy of Certificate of Completion can be claimed at the free of cost. If you need a hardcopy of this certificate, you have to pay an additional payment. The time for PDF certificate turnaround is 24 hours, and for the hardcopy, it is 3-7 working days
[/vc_column_text][/vc_column][/vc_row]
Course Curriculum
-
Inventory of Authorized and Unauthorized Devices
00:06:00
-
Inventory of Authorized and Unauthorized Software
00:06:00
-
Secure Configurations for Hardware and Software on Laptops, Workstations and Servers
00:11:00
-
Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches
00:13:00
-
Boundary Defense
00:09:00
-
Maintenance, Monitoring, and Analysis of Audit Logs
00:09:00
-
Application Software Security
00:14:00
-
Controlled Use of Administrative Privileges
00:09:00
-
Controlled Access Based on Need to Know
00:06:00
-
Continuous Vulnerability Assessment and Remediation
00:10:00
-
Account Monitoring and Control
00:10:00
-
Malware Defenses
00:10:00
-
Limitation and Control of Network Ports, Protocols and Services
00:07:00
-
Wireless Device Control
00:14:00
-
Data Loss Prevention
00:09:00
-
Secure Network Engineering
00:06:00
-
Penetration Tests and Red Team Exercises
00:11:00
-
Incident Response Capability
00:07:00
-
Data Recovery Capability
00:06:00
-
Security Skills Assessment and Appropriate Training to Fill Gaps
00:08:00
-
Mock Exam- IS20 Controls – Complete Video Training
00:20:00
-
Final Exam- IS20 Controls – Complete Video Training
00:20:00
Offer Ends in

-
Duration:3 hours, 41 minutes
-
Access:1 Year
-
Units:22

