Mile2 Cyber Security Certification Training course covers everything you need to know about IS20 Security Controls.

Course Objectives

  • Inventory of Authorized and Unauthorized Devices
  • Inventory of Authorized and Unauthorized Software
  • Secure Configurations for Hardware and Software on Laptops, Workstations and Servers
  • Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches
  • Boundary Defense

Upcoming Schedules

Course Outline

Inventory of Authorized and Unauthorized Devices
arrow iconarrow icon

  • Inventory of Authorized and Unauthorized Devices