IS20: IS20 Controls

Course Overview

Overview

Course Includes:

  • Individual Course Access
  • Course Video
  • E-Workbook
  • E-Prep & Lab Guide
  • Exam
  • 2 Week Cyber Range
  • 1 Year Exam Voucher

Mile2’s vendor-neutral IS20 Controls certification course covers proven general controls and methodologies that are used to execute and analyze the Top Twenty Most Critical Security Controls. This course allows the security professional to see how to implement controls in their existing network(s) through highly effective and economical automation. For management, this training is the best way to distinguish how you’ll assess whether these security controls are effectively being administered or if they are falling short of industry standards. Nearly all organizations containing sensitive information are adopting and implementing the most critical security controls as the highest priority list. These controls were chosen by leading government and private organizations who are experts on how compromised networks/systems evolve and how to mitigate and prevent them from happening. These leading security experts chose the best of breed controls needed to block known incidents as well as alleviate any damage from successful attacks. Ultimately, the implementation of these Top 20 Controls will ensure best efforts to drastically decrease the overall cost of security while improving both the efficiency and effectiveness of it. The IS20 Security Controls exam is taken online through Mile2’s Assessment and Certification System (“MACS”). The exam will take 2 hours and consists of 100 multiple choice questions.

Schedule

Start DateDelivery FormatDaysTimeStatusPriceEnroll
Coming SoonLive Virtual Led410:00 amEnrolling Now$2,495
Coming SoonLive Virtual Led410:00 amEnrolling Now$2,495

Looking for Corporate/Group Training?

Leave us a message

Who Should Attend

  • Information assurance managers/auditors
  • System implementers/administrators
  • Network security engineers
  • IT administrators
  • Auditors/auditees
  • DoD personnel/contractors
  • Federal agencies/clients
  • Security vendors and consulting groups looking to stay current with frameworks for information assurance

Prerequisites

Abasic understanding of networking and security technologies

Objectives

Course Outline