Leader in the cybersecurity training sector.

IS18 Controls

Category

Target group

  • Information Assurance Managers/Auditors 
  • System Implementers 
  • IT Administrators 
  • Auditors 
  • Federal Agencies
  • Security Vendors and Consulting Groups

Description

The Mile2® IS18 Controls - IS18 certification course is intended for anyone interested in learning effective information systems governance and management. This 4-day training course focuses on the implementation and analysis of the IS18 Top Controls. These controls have been identified as critical by leading government and private organizations with expertise in understanding attack techniques and mitigating risks. They are designed to prevent known attacks and minimize the impact of successful attacks. By adopting the IS18 Top Controls, organizations can enhance the security of their sensitive information. This training course equips security professionals with the tools and methodologies necessary to execute and assess these controls within their existing network infrastructure. Automation is emphasized as a highly effective and cost-efficient approach to implementing these controls. For management personnel, this training provides valuable insights into assessing the effectiveness of the security controls in place. It enables them to evaluate whether the controls are being properly administered and to make informed decisions regarding security measures.

Program

Module 01: Introduction 

Module 02: Critical Control 01, Inventory and Control of Enterprise Assets 

Module 03: Critical Control 02, Inventory and Control of Software Assets 

Module 04: Critical Control 03, Data Protection 

Module 05: Critical Control 04, Secure Configuration of Enterprise Assets and Software 

Module 06: Critical Control 05, Account Management 

Module 07: Critical Control 06, Access Control Management 

Module 08: Critical Control 07, Continuous Vulnerability Management 

Module 09: Critical Control 08, Audit Log Management 

Module 10: Critical Control 09, Email and Web Browser Protection 

Module 11: Critical Control 10, Malware Defenses 

Module 12: Critical Control 11, Data Recovery 

Module 13: Critical Control 12, Network Infrastructure Management 

Module 14: Critical Control 13, Network Monitoring and Defence 

Module 15: Critical Control 14, Security Awareness and Skills Training

Module 16: Critical Control 15, Service Provider Management 

Module 17: Critical Control 16, Applications Software Security 

Module 18: Critical Control 17, Incident Response Management 

Module 19: Critical Control 18: Penetration Testing 

Goal

Upon completion, the IS18 Security Controls candidate will be able to competently take the IS18 Controls exam and understand how to implement the top 18 most critical controls in the workplace.

Prerequisites

  • Broad Understanding of Multiple Networking and Security Technologies
  • To choose your track, see the Mile2 roadmap

Cost

2800 €

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Information request

I would like more information about your training courses

ACG Cyberacademy collects and uses the data provided via this form in order to process your registration requests. Fields marked with an * are required. The other information enables us to optimise the follow-up of your request and the quality of our customer relations.