Leader dans le secteur des formations en cybersécurité.

IS18 Controls

Catégorie

Target group

  • Information Assurance Managers/Auditors 
  • System Implementers 
  • IT Administrators 
  • Auditors 
  • Federal Agencies
  • Security Vendors and Consulting Groups

Description

The Mile2® IS18 Controls – IS18 certification course is intended for anyone interested in learning effective information systems governance and management. This 4-day training course focuses on the implementation and analysis of the IS18 Top Controls. These controls have been identified as critical by leading government and private organizations with expertise in understanding attack techniques and mitigating risks. They are designed to prevent known attacks and minimize the impact of successful attacks. By adopting the IS18 Top Controls, organizations can enhance the security of their sensitive information. This training course equips security professionals with the tools and methodologies necessary to execute and assess these controls within their existing network infrastructure. Automation is emphasized as a highly effective and cost-efficient approach to implementing these controls. For management personnel, this training provides valuable insights into assessing the effectiveness of the security controls in place. It enables them to evaluate whether the controls are being properly administered and to make informed decisions regarding security measures.

Program

Module 01: Introduction 

Module 02: Critical Control 01, Inventory and Control of Enterprise Assets 

Module 03: Critical Control 02, Inventory and Control of Software Assets 

Module 04: Critical Control 03, Data Protection 

Module 05: Critical Control 04, Secure Configuration of Enterprise Assets and Software 

Module 06: Critical Control 05, Account Management 

Module 07: Critical Control 06, Access Control Management 

Module 08: Critical Control 07, Continuous Vulnerability Management 

Module 09: Critical Control 08, Audit Log Management 

Module 10: Critical Control 09, Email and Web Browser Protection 

Module 11: Critical Control 10, Malware Defenses 

Module 12: Critical Control 11, Data Recovery 

Module 13: Critical Control 12, Network Infrastructure Management 

Module 14: Critical Control 13, Network Monitoring and Defense 

Module 15: Critical Control 14, Security Awareness and Skills Training

Module 16: Critical Control 15, Service Provider Management 

Module 17: Critical Control 16, Applications Software Security 

Module 18: Critical Control 17, Incident Response Management 

Module 19: Critical Control 18: Penetration Testing 

Goal

Upon completion, the IS18 Security Controls candidate will be able to competently take the IS18 Controls exam and understand how to implement the top 18 most critical controls in the workplace.

Prerequisites

  • Broad Understanding of Multiple Networking and Security Technologies
  • To choose your track, see the Mile2 roadmap

Tarif

2800 €
Réservez maintenant

Réserver l’événement

icône Form/calendar icon
icône Form/ticket icon
2800€
icône Form/up small icon icône Form/down small icon
Billets disponibles: Illimité
Le billet de "" est épuisé. Vous pouvez essayer un autre billet ou une autre date.

Demande d'information

Je souhaute obtenir plus d'informations sur vos formations

ACG Cyberacademy collecte et utilise les données fournies via ce formulaire afin de traiter vos demandes d'inscription. Les champs marqués d’un * sont indispensables. Les autres informations nous permettent d’optimiser le suivi de votre demande ainsi que la qualité de notre relation client.