IS 20 Controls - Information Systems 20 Controls
7/13/2020 - 7/15/2020


COURSE COST: $2295.00

COURSE TIMES: 9:00am - 5:00pm

Printable version of this course
Register for this course


This 3 - day Information Systems 20 Controls certification course covers the most important security controls and their methodologies as outlined by the US Department of Defense and other major players in the cyber security sector that understand how attacks work and what needs to be done to prevent them. Students are trained to improve security in networks by implementing the top 20 security controls; when it comes to security controls, prevention is ideal but detection is a must—the top 20 controls do both. Our instructors have real-world experience and will show you the value of what you are learning in proprietary case studies. As a result of this course and exam, attentive students are prepared to be leaders of future security projects, because they will have a plan for exactly what needs to be done in securing a network.
24 CPE Credits


Professional Roles: Security Consultant/Analyst
Penetration Tester
Security Forensics Expert
Network Security Engineer
Prerequisites: C)ISSO: Information Systems Security Officer
Or equivalent security/networking experience
Related Certification:
C)PTE: Penetration Testing Engineer


Course Kit and Lunch not included. Course Kit $ 500. Course will run as a live-virtual class unless minimum enrollment number has been met.
The Information Systems 20 Controls certification exam is taken online Assessment and Certification System (“MACS”). The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD


Upon Completion
Have knowledge of the top 20 critical security controls.
Have knowledge to implement the top 20 security controls.
Be ready to sit for the Mile 2 IS20 Certification Exam
?Be ready to sit for SANS Institute Security 440 Certification Examination

Course Content
Inventory of Authorized & Unauthorized Devices
Inventory of Authorized & Unauthorized Software
Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers
Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
Boundary Defense
Maintenance, Monitoring, and Analysis of Audit Logs
Application Software Security
Controlled Use of Administrative Privileges
Controlled Access Based on Need to Know
Continuous Vulnerability Assessment and Remediation
Account Monitoring and Control
Malware Defenses

Limitation & Control of Network Ports, Protocols & Services
Wireless Device Control
Data Loss Prevention
Secure Network Engineering
Penetration Tests & Red Team Exercises
Data Recovery Capability
Security Skills Assessment

Training Options
Instructor-led: Traditional classroom setting
Live-virtual Training: Connect remotely to the class being taught live.