• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1 Courses

IS20 Controls - Complete Video Training

4.3(43)

By John Academy

DESCRIPTION: This IS20 Controls - Complete Video Training covers proven general controls and methodologies that are used to execute and analyze the top twenty most critical security controls. Nowadays nearly all organizations containing sensitive information are adopting and implementing the most critical security controls as the highest priority list. In this course you will learn about inventory of authorized and unauthorized devices, inventory of authorized and unauthorized software, secure configurations for hardware and software on laptops, workstations and servers, secure configurations for hardware network devices such as firewalls, routers and switches, boundary defense, maintenance, monitoring, and analysis of audit logs, application software security, controlled use of administrative privileges, controlled access based on need to know, continuous vulnerability assessment and remediation, account monitoring and control, limitation and control of network ports, secure network engineering, penetration tests and red team exercises, incident response capability, data recovery capability, security skills assessment and appropriate training to fill gaps, and more. ASSESSMENT: * At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. * Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. CERTIFICATION: * After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. * Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. WHO IS THIS COURSE FOR? IS20 Controls - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. REQUIREMENTS Our IS20 Controls - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. CAREER PATH After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Inventory of Authorized and Unauthorized Devices Inventory of Authorized and Unauthorized Devices FREE 00:06:00 Inventory of Authorized and Unauthorized Software Inventory of Authorized and Unauthorized Software 00:06:00 Secure Configurations for Hardware and Software on Laptops, Workstations and Servers Secure Configurations for Hardware and Software on Laptops, Workstations and Servers 00:11:00 Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches 00:13:00 Boundary Defense Boundary Defense 00:09:00 Maintenance, Monitoring, and Analysis of Audit Logs Maintenance, Monitoring, and Analysis of Audit Logs 00:09:00 Application Software Security Application Software Security 00:14:00 Controlled Use of Administrative Privileges Controlled Use of Administrative Privileges 00:09:00 Controlled Access Based on Need to Know Controlled Access Based on Need to Know 00:06:00 Continuous Vulnerability Assessment and Remediation Continuous Vulnerability Assessment and Remediation 00:10:00 Account Monitoring and Control Account Monitoring and Control 00:10:00 Malware Defenses Malware Defenses 00:10:00 Limitation and Control of Network Ports, Protocols and Services Limitation and Control of Network Ports, Protocols and Services 00:07:00 Wireless Device Control Wireless Device Control 00:14:00 Data Loss Prevention Data Loss Prevention 00:09:00 Secure Network Engineering Secure Network Engineering 00:06:00 Penetration Tests and Red Team Exercises Penetration Tests and Red Team Exercises 00:11:00 Incident Response Capability Incident Response Capability 00:07:00 Data Recovery Capability Data Recovery Capability 00:06:00 Security Skills Assessment and Appropriate Training to Fill Gaps Security Skills Assessment and Appropriate Training to Fill Gaps 00:08:00 Mock Exam Mock Exam- IS20 Controls - Complete Video Training 00:20:00 Final Exam Final Exam- IS20 Controls - Complete Video Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

IS20 Controls - Complete Video Training
Delivered Online On Demand
£23

Educators matching "control limitations"

Show all 2