Who should attend
Information Assurance Managers/Auditors, System Implementers, IT Administrators, Auditors, Federal Agencies, Security Vendors and Consulting Groups
Prerequisites
Broad Understanding of Multiple Networking and Security Technologies
Course Objectives
Upon completion, the IS18 Security Controls candidate will be able to competently take the IS18 Controls exam and understand how to implement the top 18 most critical controls in the workplace.
Course Content
"Module 01: Introduction Module 02: Inventory and Control Module 03: Inventory and Control of Software Assets Module 04: Data Protection Module 05: Secure Configuration of Enterprise Assets and Software Concept Module 06: Account Management Module 07: Access Control Management Module 08: Continuous Vulnerability Management Module 09: Audit Log Management Module 10: Email and Browser Protection Module 11: Malware Defenses Module 12: Data Recovery Module 13: Network Infrastructure Management Module 14: Network Monitoring and Defense Module 15: Security Awareness and Skills Training Module 16: Service Provider Management Module 17: Applications Software Security Module 18: Incident Response Mgmt. Module 19: Penetration Testing"
The Mile2 IS18 Controls – IS18 certification course is intended for anyone interested in learning effective information systems governance and management. This 4-day training course focuses on the implementation and analysis of the IS18 Top Controls. These controls have been identified as critical by leading government and private organizations with expertise in understanding attack techniques and mitigating risks. They are designed to prevent known attacks and minimize the impact of successful attacks. By adopting the IS18 Top Controls, organizations can enhance the security of their sensitive information. This training course equips security professionals with the tools and methodologies necessary to execute and assess these controls within their existing network infrastructure. Automation is emphasized as a highly effective and cost-efficient approach to implementing these controls. For management personnel, this training provides valuable insights into assessing the effectiveness of the security controls in place. It enables them to evaluate whether the controls are being properly administered and to make informed decisions regarding security measures.