IS20 Controls Series

Provided by

Enquire about this course

About the course

This series covers everything you need to know about IS20 Security Controls. Students will learn about inventory of authorized and unauthorized devices, inventory of authorized and unauthorized software, secure configurations for hardware and software on laptops, workstations and servers, secure configurations for hardware network devices such as firewalls, routers and switches, boundary defense, maintenance, monitoring, and analysis of audit logs, application software security, controlled use of administrative privileges, controlled access based on need to know, continuous vulnerability assessment and remediation, account monitoring and control, malware defenses, limitation and control of network ports, protocols and services, wireless device control, data loss prevention, secure network engineering, penetration tests and red team exercises, incident response capability, data recovery capability, and security skills assessment and appropriate training to fill gaps.

Enquire

Start date Location / delivery
No fixed date Online Book now

Related article

Five great careers in Cyber Security Cyber security is one of the fastest developing industries in the world. The number of cyber-attacks rises yea...