Module 01 – Inventory of Authorized and Unauthorized Devices 6m
Inventory of Authorized and Unauthorized Devices
Module 02 – Inventory of Authorized and Unauthorized Software 6m
Inventory of Authorized and Unauthorized Software
Module 03 – Secure Configurations for Hardware and Software on
Laptops, Workstations and Servers 12m
Secure Configurations for Hardware and Software on Laptops, Workstations and Servers
Module 04 – Secure Configurations for Hardware Network Devices
such as Firewalls, Routers and Switches 13m
Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches
Module 05 – Boundary Defense 9m
Boundary Defense
Module 06 – Maintenance, Monitoring, and Analysis of Audit Logs 9m
Maintenance, Monitoring, and Analysis of Audit Logs
Module 07 – Application Software Security 14m
Application Software Security
Module 08 – Controlled Use of Administrative Privileges 9m
Controlled Use of Administrative Privileges
Module 09 – Controlled Access Based on Need to Know 6m
Controlled Access Based on Need to Know
Module 10 – Continuous Vulnerability Assessment and Remediation 10m
Continuous Vulnerability Assessment and Remediation
Module 11 – Account Monitoring and Control 10m
Account Monitoring and Control
Module 12 – Malware Defenses 10m
Malware Defenses
Module 13 – Limitation and Control of Network Ports, Protocols and Services 7m
Limitation and Control of Network Ports, Protocols and Services
Module 14 – Wireless Device Control 14m
Wireless Device Control
Module 15 – Data Loss Prevention 9m
Data Loss Prevention
Module 16 – Secure Network Engineering 6m
Secure Network Engineering
Module 17 – Penetration Tests and Red Team Exercises 11m
Penetration Tests and Red Team Exercises
Module 18 – Incident Response Capability 7m
Incident Response Capability
Module 19 – Data Recovery Capability 6m
Data Recovery Capability
Module 20 – Security Skills Assessment and Appropriate Training to Fill Gaps 8m
Security Skills Assessment and Appropriate Training to Fill Gaps
Total Duration: 3hrs 4m