This series covers everything you need to know about IS20 Security Controls. Students will learn about inventory of authorized and unauthorized devices, inventory of authorized and unauthorized software, secure configurations for hardware and software on laptops, workstations and servers, secure configurations for hardware network devices such as firewalls, routers and switches, boundary defense, maintenance, monitoring, and analysis of audit logs, application software security, controlled use of administrative privileges, controlled access based on need to know, continuous vulnerability assessment and remediation, account monitoring and control, malware defenses, limitation and control of network ports, protocols and services, wireless device control, data loss prevention, secure network engineering, penetration tests and red team exercises, incident response capability, data recovery capability, and security skills assessment and appropriate training to fill gaps.
Who should take this course
Anyone can take up this course upon interest in anytime you want, anywhere you want, all you need is a smart phone/tablet/computer connected to the internet.
Upon completion, you will have a test with multiple choice questions and there is no limit on the number of attempts.
Completion certificated will be given
Professional roles include, but at not limited to Security Consultant/Analyst, Penetration Tester, Security Forensics Experts, and Network Security Engineer.
About Course Provider
Courses Distance Learning is a provider of career essential courses. Simple understandable media content, concept oriented learning which helps develop career opportunities in the corporate World.
The learning experience has been designed from the ground up keeping your success in mind.
You can study at your own pace and from the comfort of your own home.
How to enroll?
You can book the course instantly by paying on GulfTalent.