Title SANS 20 Critical Security Controls: Planning, Implementing and Auditing
Description and Details
This course helps you master specific, proven techniques and tools needed to implement and audit the Top Twenty Most Critical Security Controls. These Top 20 Security Controls, listed below, are rapidly becoming accepted as the highest priority list of what must be done and proven before anything else at nearly all serious and sensitive organizations. These controls were selected and defined by the US military and other government and private organizations (including NSA, DHS, GAO, and many others) who are the most respected experts on how attacks actually work and what can be done to stop them. They defined these controls as their consensus for the best way to block the known attacks and the best way to help find and mitigate damage from the attacks that get through. For security professionals, the course enables you to see how to put the controls in place in your existing network though effective and widespread use of cost-effective automation. For auditors, CIOs, and risk officers, the course is the best way to understand how you will measure whether the Top 20 controls are effectively implemented. It closely reflects the Top 20 Critical Security Controls found at
The Top 20 are listed below. You will find the full document describing the Top 20 Most Critical Security Controls posted at the Center for Strategic and International Studies at
One of the best features of the course is that it uses offense to inform defense. In other words, you will learn about the actual attacks that you'll be stopping or mitigating. That makes the defenses very real, and it makes you a better security person.
As a student of the 20 Critical Security Controls two-day course, you'll learn important skills that you can take back to your workplace and use your first day back on the job in implementing and auditing each of the following controls:

Critical Controls Subject to Automated Collection, Measurement, and Validation:
Inventory of Authorized and Unauthorized Devices
Inventory of Authorized and Unauthorized Software
Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers
Secure Configurations of Network Devices Such as Firewalls, Routers, and Switches
Boundary Defense
Maintenance and Analysis of Security Audit Logs
Application Software Security
Controlled Use of Administrative Privileges
Controlled Access Based On Need to Know
Continuous Vulnerability Assessment and Remediation
Account Monitoring and Control
Malware Defenses
Limitation and Control of Network Ports, Protocols, and Services
Wireless Device Control
Data Loss Prevention

Additional Critical Controls (not directly supported by automated measurement and validation):
Secure Network Engineering
Penetration Tests and Red Team Exercises
Incident Response Capability
Data Recovery Capability
Security Skills Assessment and Training to Fill Gaps
Why this might be the most important course you'll take to boost your career in cyber security
What are the most important things we have to do to protect our systems? That is the question the defense industrial base CIOs asked the DoD when they learned their systems were leaking and losing some of America's most important military secrets to nation-state hackers. It is also the question that CIOs throughout government are asking when they learn from Government Accountability Office Congressional testimony that FISMA audits are not measuring security effectively. It is exactly the same question that is being asked in power companies and banks and oil and gas organizations and health care organizations. If you are the person who can not only answer the question, but also implement and/or audit the controls, you will be the game changer. It might not happen immediately, but it will happen.

People who have taken training from Dr. Cole have this to say:

Great teacher; very knowledgeable, passionate, entertaining, and informative. Mike Mayers, RIM

Expertise of the instructor lets me concentrate on learning, rather than interpreting! Leo Lavender, McDonald Observatory, University of Texas

This is my first formal security class. Eric's energy and presentation definitely makes me want to sign right up for the next class. Minyon L. Ridley, ENSR/AECOM

Dr. Cole is an incredible teacher. He is one of the only teachers that I have experienced in my many years of classes that can keep your attention 100% of the time. Blake Sharin, Florida Dept of Health

People who have taken training from James Tarala have said this:

James is quite a talented and captivating speaker. He seems to never miss a beat and has an immense knowledge base. Charles Bolte, U.S. Army

James Tarala is a great instructor! Enjoyable to listen to, easy to follow and helpful in the labs. I would not hesitate to register for another class that Mr. Tarala is teaching. Sarah Rosman, Sterling Savings Bank

James conveys the technical subject matter in an easily understandable manner that is easy to visualize and comprehend. Idris Fofana, TREX
Web Link

Back To Information Security Standards List

Database Sections