Booking options
£23
£23
On-Demand course
3 hours 41 minutes
All levels
This IS20 Controls - Complete Video Training covers proven general controls and methodologies that are used to execute and analyze the top twenty most critical security controls. Nowadays nearly all organizations containing sensitive information are adopting and implementing the most critical security controls as the highest priority list. In this course you will learn about inventory of authorized and unauthorized devices, inventory of authorized and unauthorized software, secure configurations for hardware and software on laptops, workstations and servers, secure configurations for hardware network devices such as firewalls, routers and switches, boundary defense, maintenance, monitoring, and analysis of audit logs, application software security, controlled use of administrative privileges, controlled access based on need to know, continuous vulnerability assessment and remediation, account monitoring and control, limitation and control of network ports, secure network engineering, penetration tests and red team exercises, incident response capability, data recovery capability, security skills assessment and appropriate training to fill gaps, and more.
At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not.
Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam.
After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement.
Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24.
IS20 Controls - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills.
As there is no experience and qualification required for this course, it is available for all students from any academic background.
Our IS20 Controls - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.
After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.
Inventory of Authorized and Unauthorized Devices | |||
Inventory of Authorized and Unauthorized Devices | FREE | 00:06:00 | |
Inventory of Authorized and Unauthorized Software | |||
Inventory of Authorized and Unauthorized Software | 00:06:00 | ||
Secure Configurations for Hardware and Software on Laptops, Workstations and Servers | |||
Secure Configurations for Hardware and Software on Laptops, Workstations and Servers | 00:11:00 | ||
Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches | |||
Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches | 00:13:00 | ||
Boundary Defense | |||
Boundary Defense | 00:09:00 | ||
Maintenance, Monitoring, and Analysis of Audit Logs | |||
Maintenance, Monitoring, and Analysis of Audit Logs | 00:09:00 | ||
Application Software Security | |||
Application Software Security | 00:14:00 | ||
Controlled Use of Administrative Privileges | |||
Controlled Use of Administrative Privileges | 00:09:00 | ||
Controlled Access Based on Need to Know | |||
Controlled Access Based on Need to Know | 00:06:00 | ||
Continuous Vulnerability Assessment and Remediation | |||
Continuous Vulnerability Assessment and Remediation | 00:10:00 | ||
Account Monitoring and Control | |||
Account Monitoring and Control | 00:10:00 | ||
Malware Defenses | |||
Malware Defenses | 00:10:00 | ||
Limitation and Control of Network Ports, Protocols and Services | |||
Limitation and Control of Network Ports, Protocols and Services | 00:07:00 | ||
Wireless Device Control | |||
Wireless Device Control | 00:14:00 | ||
Data Loss Prevention | |||
Data Loss Prevention | 00:09:00 | ||
Secure Network Engineering | |||
Secure Network Engineering | 00:06:00 | ||
Penetration Tests and Red Team Exercises | |||
Penetration Tests and Red Team Exercises | 00:11:00 | ||
Incident Response Capability | |||
Incident Response Capability | 00:07:00 | ||
Data Recovery Capability | |||
Data Recovery Capability | 00:06:00 | ||
Security Skills Assessment and Appropriate Training to Fill Gaps | |||
Security Skills Assessment and Appropriate Training to Fill Gaps | 00:08:00 | ||
Mock Exam | |||
Mock Exam- IS20 Controls - Complete Video Training | 00:20:00 | ||
Final Exam | |||
Final Exam- IS20 Controls - Complete Video Training | 00:20:00 | ||
Certificate and Transcript | |||
Order Your Certificates and Transcripts | 00:00:00 |