Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

IS20 Security Controls

Course Cover
compare button icon

Course Features

icon

Duration

3 hours

icon

Delivery Method

Online

icon

Available on

Lifetime Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

3 hours

Course Description

Security Controls are what we all know. Security controls are security measures or countermeasures that protect or mitigate physical assets, information systems, and other assets from potential threats. This intermediate course covers the most important security controls and methods that can be used to analyze and execute the Top Twenty Most Critical Security Controls. This course enables security professionals to learn how to implement control in their network(s) using highly efficient and economically-friendly automation. This training will help managers determine how to assess the effectiveness of security controls. Nearly all sensitive information-containing organizations are implementing the most important security controls. These controls were selected by experts from both the government and private sectors who know how compromised networks/systems develop and how they can be prevented. This course prepares students for the IS20 Certification Exam. $83,443 is the average annual salary for Information Assurance Managers.

Course Overview

projects-img

Alumni Network

projects-img

Human Interaction

projects-img

Case Based Learning

projects-img

Post Course Interactions

projects-img

Case Studies,Instructor-Moderated Discussions

Skills You Will Gain

Prerequisites/Requirements

Suggested prerequisites courses: LFS211 - Linux Networking and Administration, Certified Security Leadership Officer

A basic understanding of networking and security technologies

What You Will Learn

Implement the top 20 most critical controls in the work place

Maintenance, Monitoring, and Analysis of Audit Logs

Target Students

IT administrators

Network security engineers

Information assurance managers/auditors

Course Cover

This Course Is Not Available In Your Country Or Region

Explore Related Courses