Topic outline

  • General

  • Course 01 - Inventory of Authorized and Unauthorized DevicesAccess Now - No Membership Required

    • Course 02 - Inventory of Authorized and Unauthorized Software

      • Course 03 - Secure Configurations for Hardware and Software on Laptops, Workstations and Servers

        • Course 04 - Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches

          • Course 05 - Boundary Defense

            • Course 06 - Maintenance, Monitoring, and Analysis of Audit Logs

              • Course 07 - Application Software Security

                • Course 08 - Controlled Use of Administrative Privileges

                  • Course 09 - Controlled Access Based on Need to Know

                    • Course 10 - Continuous Vulnerability Assessment and Remediation

                      • Course 11 - Account Monitoring and Control

                        • Course 12 - Malware Defenses

                          • Course 13 - Limitation and Control of Network Ports, Protocols and Services

                            • Course 14 - Wireless Device Control

                              • Course 15 - Data Loss Prevention

                                • Course 16 - Secure Network Engineering

                                  • Course 17 - Penetration Tests and Red Team Exercises

                                    • Course 18 - Incident Response Capability

                                      • Course 19 - Data Recovery Capability

                                        • Course 20 - Security Skills Assessment and Appropriate Training to Fill Gaps

                                          Don't wait. The IS20 Security Controls Online Training Series Course is ready to go.

                                          The best IS20 Security Controls Online Training Series Course on the planet.