shopping cart0
Call for support:
770-410-1219

Auditing A Cybersecurity Program Agenda

auditing-a-cybersecurity-program
Seminar: ID# 1005026

This course is available in both in-person and video conference formats.

See All Venues And Dates

Agenda

Vulnerability Assessment
  • Assessment components
  • Conducting
  • Evaluating
Threat Analysis
  • Assessment components
  • Conducting
  • Evaluating
Cybersecurity Risk Assessment
  • Assessment components
  • Conducting
  • Evaluating
Cybersecurity Program
  • Assessment components
  • Conducting
  • Evaluating
Conducting a Cybersecurity Audit Based on the Top 20 Controls Identified in CIS Critical Security Controls V6.1
  • Inventory authorized and unauthorized devices
  • Inventory authorized and unauthorized software
  • Secure configurations
  • Continuous vulnerability assessment and remediation
  • Control use of administrative privileges
  • Maintenance, monitoring and analysis of audit logs
  • Email and web browser protection
  • Malware defenses
  • Limitation and control of network ports, protocols and services
  • Data recovery capability
  • Security configurations for network devices
  • Boundary defenses
  • Data protection
  • Controlled access based on need to know
  • Wireless access control
  • Account monitoring and control
  • Security skills assessment and training
  • Application software security
  • Incident response and management
  • Penetration test and red team exercises
Order:
Auditing A Cybersecurity Program
See All Venues And Dates
HR Training Center 5755 North Point Parkway Suite 227 Alpharetta, GA 30022 770-410-1219 support@HRTrainingCenter.com
Stay Up To Date
Need training or resources in other areas? Try our other Training Center sites:
Accounting Banking Insurance Financial Services Real Estate Mortgage Safety
Facebook