IS20 Controls are the Top Twenty Most Critical Security Controls in Information Technology. This 4-dag training course covers proven tools and methodologies needed to execute and analyze the Top Twenty Most Critical Security Controls. Nearly all organizations containing sensitive information are adopting and implementing the most critical security controls as the highest priority list. These controls were chosen by leading government and private organizations who are experts on how attacks work and what can be done to prevent them from happening. The controls were selected as the best way to block down attacks as well as help search for and alleviate any damage from the attacks that are successful. This course allows the security professional to see how to implement controls in an existing network through highly effective and economical automation. For management, this training is the best way to distinguish how you will assess whether these security controls are effectively being administered.
Key Course information:
Duration: 4 days
Language: English
Class formats:
- Instructor-led
- Self-Study
- Live Virtual Training
Suggested Prior Knowledge: CHT, COST or equivalent knowledge.
Applicable Exams:
Mile2 IS20
CPEs: 32
Modules:
-
- Module 1: Introduction
- Module 2: Critical Control 1
- Module 3: Critical Control 2
- Module 4: Critical Control 3
- Module 5: Critical Control 4
- Module 6: Critical Control 5
- Module 7: Critical Control 6
- Module 8: Critical Control 7
- Module 9: Critical Control 8
- Module 10: Critical Control 9
- Module 11: Critical Control 10
- Module 12: Critical Control 11
- Module 13: Critical Control 12
- Module 14: Critical Control 13
- Module 15: Critical Control 14
- Module 16: Critical Control 15
- Module 17: Critical Control 16
- Module 18: Critical Control 17
- Module 19: Critical Control 18
- Module 20: Critical Control 19
- Module 21: Critical Control 20
Who should attend:
- Information Assurance Managers/Auditors
- System Implementors/Administrators
- Auditors/Auditees
- Federal Agencies/Contractors
- Security Vendors and Counseling Groups
Upon Completion:
Upon completion, the IS20 Security Controls candidate will be able to not only completely take the IS20 Controls Exam but will also have an understanding of how to implement the top 20 most critical controls in the work place.
Re-Certification Requirements
All Mile2 certifications will be awarded a 3-year expiration date.
There are two requirements to maintain Mile2 Certification:
1) Pass the most current version of the exam for your respective existing certification
2) Earn 20 CEUs (Continuing Education Units) per year. You may submit your CEUs in your Mile2 inbox. These CEUs must fall under “Qualify Continuing Educational Activities).
IS20 Exam Information:
The IS20 exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account.
The exam will take 2 hours and consists of 100 multiple choice questions.
Course Facts:
Do you have to purchase a course to buy a certification exam?
- No. You do not have to purchase a course to buy a certification exam.
Do all Mile2 courses map to a role based career path?
- All of our courses can be taken independently. In order to help guide our students on their cybersecurity career journey we have developed the Mile2 Certification Roadmap. This helpful resource maps specific courses to Role-based career tracks.