O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

IS20 Security Controls (IS20)

Video Description

The IS20 Security Controls training course is based on the official Mile2’s vendor neutral IS20 Controls certification objectives and covers the proven general controls and methodologies that are used to execute and analyze the twenty most critical security controls. This course enables the IT security professionals to implement controls in their existing network(s) through highly effective and economical automation. The course is equally helpful for the enterprise management staff to effectively gauge the effectiveness of security controls implemented in their organizations. This training course is a comprehensive and essential course for security professionals working with sensitive information and are responsible to ensure its security. The course focuses on the twenty most critical controls suggested by the leading government and private organizations. The implementation of these Top 20 Controls will ensure best efforts to drastically decrease the overall cost of security while improving both the efficiency and effectiveness of it. NOTE Mile2 is: ACCREDITED by the NSA CNSS 4011-4016 MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

Table of Contents

  1. Module 01 - Inventory of Authorized and Unauthorized Devices
    1. Inventory of Authorized and Unauthorized Devices 00:06:08
  2. Inventory of Authorized and Unauthorized Software
    1. Inventory of Authorized and Unauthorized Software 00:05:55
  3. Module 03 - Secure Configurations for Hardware and Software on Laptops, Workstat
    1. Secure Configurations for Hardware and Software on Laptops, Workstations and Servers 00:11:31
  4. Module 04 - Secure Configurations for Hardware Network Devices
    1. Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches 00:13:23
  5. Module 05 - Boundary Defense
    1. Boundary Defense 00:09:29
  6. Module 06 - Maintenance, Monitoring, and Analysis of Audit Logs
    1. Maintenance, Monitoring, and Analysis of Audit Logs 00:09:08
  7. Module 07 - Application Software Security
    1. Application Software Security 00:14:29
  8. Module 08 - Controlled Use of Administrative Privileges
    1. Controlled Use of Administrative Privileges 00:09:28
  9. Module 09 - Controlled Access Based on Need to Know
    1. Controlled Access Based on Need to Know 00:05:39
  10. Module 10 - Continuous Vulnerability Assessment and Remediation
    1. Continuous Vulnerability Assessment and Remediation 00:10:25
  11. Module 11 - Account Monitoring and Control
    1. Account Monitoring and Control 00:09:41
  12. Module 12 - Malware Defenses
    1. Malware Defenses 00:09:49
  13. Module 13 - Limitation and Control of Network Ports, Protocols and Services
    1. Limitation and Control of Network Ports, Protocols and Services 00:07:23
  14. Module 14 - Wireless Device Control
    1. Wireless Device Control 00:13:58
  15. Module 15 - Data Loss Prevention
    1. Data Loss Prevention 00:08:48
  16. Module 16 - Secure Network Engineering
    1. Secure Network Engineering 00:06:21
  17. Module 17 - Penetration Tests and Red Team Exercises
    1. Penetration Tests and Red Team Exercises 00:10:47
  18. Module 18 - Incident Response Capability
    1. Incident Response Capability 00:07:12
  19. Module 19 - Data Recovery Capability
    1. Data Recovery Capability 00:06:15
  20. Module 20 - Security Skills Assessment and Appropriate Training to Fill Gaps
    1. Security Skills Assessment and Appropriate Training to Fill Gaps 00:08:04