Training Mile2

Training goals dlearning

code: M2-IS20 | version: v1

Top 20 Information Systems Security Controls (Maps to SANS Top 20 Controls)

Mile2’s vendor-neutral IS20 Security Controls certification course covers proven general controls and methodologies that are used to execute and analyze the Top Twenty Most Critical Security Controls. This course allows the security professional to see how to implement controls in their existing network(s) through highly effective and economical automation. For management, this training is the best way to distinguish how you’ll assess whether these security controls are effectively being administered or if they are falling short of industry standards.

Nearly all organizations containing sensitive information are adopting and implementing the most critical security controls as the highest priority list. These controls were chosen by leading government and private organizations who are experts on how compromised networks/systems evolve and how to mitigate and prevent them from happening. These leading security experts chose the best of breed controls needed to block known incidents as well as alleviate any damage from successful attacks. Ultimately, the implementation of these Top 20 Controls will ensure best efforts to drastically decrease the overall cost of security while improving both the efficiency and effectiveness of it.

Upon completion:

  • The IS20 Security Controls candidate will be able to not only competently take the IS20 Security Controls exam but will also have an understanding of how to implement the top 20 most critical controls in the work place.

Who Should Attend:

  • Information assurance managers/auditors
  • System implementers/administrators
  • Network security engineers
  • IT administrators
  • Auditors/auditees
  • DoD personnel/contractors
  • Federal agencies/clients
  • Security vendors and consulting groups looking to stay current with frameworks for information assurance

Accreditations & Acknowledgements

Mile2® is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

Conspect Show list

  1. Course IntroductionCritical Control 2: Inventory of Authorized and Unauthorized Software
  2. Critical Control 3: Secure Configurations for Hardware and Software on
  3. Critical Control 4: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
  4. Critical Control 5: Boundary Defense
  5. Critical Control 6: Maintenance, Monitoring, and Analysis of Audit Logs Network Ports, Protocols, and Services
  6. Critical Control 7: Application Software Security
  7. Critical Control 8: Controlled Use of Administrative Privileges
  8. Critical Control 9: Controlled Access Based on Need to KNow
  9. Critical Control 10: Continuous Vulnerability Assessment and Remediation
  10. Critical Control 11: Account Monitoring and Control
  11. Critical Control 12: Malware Defenses
  12. Critical Control 13: Limitation and Control of
  13. Critical Control 14: Wireless Device Control
  14. Critical Control 15: Data Loss Prevention
  15. Critical Control 16: Secure Network Engineering
  16. Critical Control 17: Penetration Tests and Red Team Exercises
  17. Critical Control 18: Incident Response Capability
  18. Critical Control 19: Data Recovery Capability
  19. Critical Control 20: Security Skills Assessment and Appropriate Training to Fill Gaps
Download conspect training as PDF

Additional information

  • A basic understanding of networking and security technologies.
Difficulty level
Duration 3 days

The participants will obtain certificates signed by Mile2 (course completion).

This course will help prepare you for the IS20 Security Controls exam, which is available through the on-line Mile2’s Assessment and Certification System (“MACS”),  and is accessible on your account. The exam will take 2 hours and consist of 100 multiple choice questions. 

Each participant in an authorized training IS20 Security Controls will receive a free IS20 Controls exam voucher.


Certified Mile2 Instructor.

Additional informations

We also recommend further training and certification:

Other training Mile2 | IS Management Leadership

Training thematically related

IT Security

Contact form

Please fill form below to obtain more info about this training.

* Fields marked with (*) are required !!!

Information on data processing by Compendium - Centrum Edukacyjne Spółka z o.o.


  • Please contact us by phone using the form below in order to perform calculations as training

Upcoming Mile2 training

Training schedule Mile2