IS20 — Information Systems 20 Controls Mile2’s Information Systems 20 Controls course covers the most important security controls and their methodologies as outlined by the U.S. Department of Defense and other major players in the cybersecurity sector who understand how attacks work and how to prevent them. Students are trained to improve security in networks by implementing the top 20 security controls. When it comes to security controls, prevention is ideal but detection is a must—the top 20 controls do both. Experts began to compile the Top 20 Security Controls list (Consensus Audit Guidelines) in 2008 after many U.S. defense industry companies suffered a severe loss of data due to various cyberattacks. As these attacks continued to rise, many federal cyberattacks and defense experts were compelled to collaborate with each other. Their understanding and knowledge of these malicious attack techniques were being used against both government and corporate industries alike. This collaboration resulted in the top 20 list of known security controls needed to ensure the integrity of organizational assets. The CAG project was led by John Gilligan who served as chief information officer for both the U.S. Air Force and the U.S. Department of Energy. In a statement, Gilligan said that “It was obvious that organizations should implement these controls.” He also stated that “if you know that attacks are being carried out, you have a responsibility to prioritize your security investments to stop those attacks.” Our instructors have real-world experience and will show you the value of what you are learning in proprietary case studies. Students will be prepared to take the IS20 Certification Exam after this course. As a result of this course and exam, attentive students are prepared to lead future security projects because they will have a plan for exactly what needs to be done to secure a network. At the end of the course, students will be prepared to take the IS20 Controls Exam. Prerequisites: A basic understanding of security and network technologies is helpful Length: 3 days when taken Onsite or Live Remote. Price: 3 days x $493 per day =$1,479 for Onsite and Live Remote courses; Self Paced is $950. NOTE: The cost of this course may be covered by funds from the Homeland Security Grant Program. Funds may cover the cost of registration, travel, lodging, per-diem, backfill or overtime. (CSTI Course Number: CP-M2IS201) **Also, for enrollment of more than 2 people, please call Stronger International at 1-877-810-7898 during office hours (9-5 PST) or email info@ for direct payment or arrangement of ACH payments. Dates:Onsite: Classes begin at 9am Pacific Time and end at 5pm each day. Live Remote: Classes begin at 7am Pacific Time and end at 3pm each day. Self paced can start at any time and are valid for one year. The self paced course include: Single Course Access Course Video E-Workbook E-Prep Guide Exam Audience: IT Administrators Software Engineers Security Professionals IT Auditors Security Consultants *Certification Exam is included with the cost of the course.