Cyber Security Training Catalog – IS20 Controls Series!

$75.00Add to cart

Overview: This Official Mile2® cyber security certification training series covers everything you need to know about IS20 Security Controls. Students will learn about inventory of authorized and unauthorized devices, inventory of authorized and unauthorized software, secure configurations for hardware and software on laptops, workstations and servers, secure configurations for hardware network devices such as firewalls, routers and switches, boundary defense, maintenance, monitoring, and analysis of audit logs, application software security, controlled use of administrative privileges, controlled access based on need to know, continuous vulnerability assessment and remediation, account monitoring and control, malware defenses, limitation and control of network ports, protocols and services, wireless device control, data loss prevention, secure network engineering, penetration tests and red team exercises, incident response capability, data recovery capability, and security skills assessment and appropriate training to fill gaps. Becoming certified in Information Systems 20 Controls verifies that you have learned the important security controls and their methodologies as outlined by the US Department of Defense and other major players in the cyber security sector. You have an understanding of how attacks work and what needs to be done to prevent them. You are trained to improve security in networks by implementing the top 20 security controls, allowing you to prevent and detect. Those certified in IS20 Controls are now prepared to be leaders of future security projects, because they will have a plan for exactly what needs to be done in securing a network.

Course Modules:

Module 01 – Inventory of Authorized and Unauthorized Devices 

(Duration: 6m)

  1. Workbook (Pdf)
  2. Inventory of Authorized and Unauthorized Devices
  3. Review Quiz (Number of attempts allowed: Unlimited)

Module 03 – Secure Configurations for Hardware and Software on Laptops, Workstations and Servers

(Duration: 12m)

  1. Workbook (Pdf)
  2. Secure Configurations for Hardware and Software on Laptops, Workstations and Servers
  3. Review Quiz (Number of attempts allowed: Unlimited)

Module 05 – Boundary Defense 

(Duration: 9m)

  1. Workbook (Pdf)
  2. Boundary Defense
  3. Review Quiz (Number of attempts allowed: Unlimited)

Module 07 – Application Software Security 

(Duration: 14m)

  1. Workbook (Pdf)
  2. Application Software Security
  3. Review Quiz (Number of attempts allowed: Unlimited)

Module 09 – Controlled Access Based on Need to Know

(Duration: 6m)

  1. Workbook (Pdf)
  2. Controlled Access Based on Need to Know
  3. Review Quiz (Number of attempts allowed: Unlimited)

Module 11 – Account Monitoring and Control

(Duration: 10m)

  1. Workbook (Pdf)
  2. Account Monitoring and Control
  3. Review Quiz (Number of attempts allowed: Unlimited)

Module 13 – Limitation and Control of Network Ports, Protocols and Services

(Duration: 7m)

  1. Workbook (Pdf)
  2. Limitation and Control of Network Ports, Protocols and Services
  3. Review Quiz (Number of attempts allowed: Unlimited)

Module 15 – Data Loss Prevention 

(Duration: 9m)

  1. Workbook (Pdf)
  2. Data Loss Prevention
  3. Review Quiz (Number of attempts allowed: Unlimited)

Module 17 – Penetration Tests and Red Team Exercises

(Duration: 11m)

  1. Workbook (Pdf)
  2. Penetration Tests and Red Team Exercises
  3. Review Quiz (Number of attempts allowed: Unlimited)

Module 19 – Data Recovery Capability

(Duration: 6m)

  1. Workbook (Pdf)
  2. Data Recovery Capability
  3. Review Quiz (Number of attempts allowed: Unlimited)

Training Final Exam ?

Are you ready to earn your certificate of completion?

Launch The Exam

This course includes
  • about 3.4 hours on-demand video
  • 20 downloadable Pdf Workbooks
  • Unlimited time access (During Membership)
  • Access on mobile and Desktop
  • Certificate of Completion

Module 02 – Inventory of Authorized and Unauthorized Software 

(Duration: 6m)

  1. Workbook (Pdf)
  2. Inventory of Authorized and Unauthorized Software
  3. Review Quiz (Number of attempts allowed: Unlimited)

Module 04 – Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches

(Duration: 13m)

  1. Workbook (Pdf)
  2. Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches
  3. Review Quiz (Number of attempts allowed: Unlimited)

Module 06 – Maintenance, Monitoring, and Analysis of Audit Logs

(Duration: 9m)

  1. Workbook (Pdf)
  2. Maintenance, Monitoring, and Analysis of Audit Logs
  3. Review Quiz (Number of attempts allowed: Unlimited)

Module 08 – Controlled Use of Administrative Privileges 

(Duration: 9m)

  1. Workbook (Pdf)
  2. Controlled Use of Administrative Privileges
  3. Review Quiz (Number of attempts allowed: Unlimited)

Module 10 – Continuous Vulnerability Assessment and Remediation

(Duration: 10m)

  1. Workbook (Pdf)
  2. Continuous Vulnerability Assessment and Remediation
  3. Review Quiz (Number of attempts allowed: Unlimited)

Module 12 – Malware Defenses

(Duration: 10m)

  1. Workbook (Pdf)
  2. Malware Defenses
  3. Review Quiz (Number of attempts allowed: Unlimited)

Module 14 – Wireless Device Control 

(Duration: 14m)

  1. Workbook (Pdf)
  2. Wireless Device Control
  3. Review Quiz (Number of attempts allowed: Unlimited)

Module 16 – Secure Network Engineering

(Duration: 6m)

  1. Workbook (Pdf)
  2. Secure Network Engineering
  3. Review Quiz (Number of attempts allowed: Unlimited)

Module 18 – Incident Response Capability 

(Duration: 7m)

  1. Workbook (Pdf)
  2. Incident Response Capability
  3. Review Quiz (Number of attempts allowed: Unlimited)

Module 20 – Security Skills Assessment and Appropriate Training to Fill Gaps

(Duration: 8m)

  1. Workbook (Pdf)
  2. Security Skills Assessment and Appropriate Training to Fill Gaps
  3. Review Quiz (Number of attempts allowed: Unlimited)

$75.00Add to cart

Course Features Include:

  • Expert Lectures
    Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience.

  • Certificates of Completion
    Upon completion of a series of courses you can earn a certificate of completion from Career Academy. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment.

  • PowerPoint Visuals:
    Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts.

  • Professional Development Activities
    Students are provided access to professional development activity files which allow for an individual to test out course theories and apply the knowledge they earned from the course.

  • Review Quizzes
    Once a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores.

  • Mobile Access
    With our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go!

Trusted by Aspiring IT Professionals, Corporations and
Government agencies
for more than a Decade

Get unlimited online access learn anywhere, anytime using your computer or mobile device!