Controls Training Courses and Workshops

Schools providing training courses, certificates, diplomas or degree programs of Controls




Total 277 training courses and degree programs available around the world.

Export Controls

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: Online Institute of America
Training Center(s)/Venue(s): Lakeway, United States
  V

Exporting �that is, the shipment or transmission of items or material outside of the U.S. �is heavily regulated by federal laws and regulations referred to collectively as “export controls.�These controls affect the export of commodities (goods and materials), technology (technical data and know �how) and software from the U.S. to a foreign country. They also affect the re �export of any such U.S. items from one foreign country to another, as well as products made outside the U.S. by or for a U.S. company.
Program Summary
This program is designed to provide an overview of U.S. export controls. It will not make an employee an “export expert,�but it will help him or her recognize “red flags��situations presenting a risk of legal violations �and deal with them properly.
The topics covered in the program include -.
â—¦Overview of export controls
â—¦Export control agencies
◦What is an “export�
â—¦Defense exports under the ITAR
â—¦Commercial exports under the EAR
◦Anti �boycott and embargo rules
◦Red �flag issues
â—¦Pen... [Read More]

Food and Beverage Controls

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Greenville Technical College
Training Center(s)/Venue(s): Greenville, Simpsonville, Taylors, United States

This course covers the principles and procedures involved in an effective food and beverage control system, including standards determination, operating budgets, cost-volume-profit analysis, income and cost control, menu pricing, labor cost control, and computer applications related to these concepts.

Purchasing and Cost Controls

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: Anne Arundel Community College
Training Center(s)/Venue(s): Annapolis, Arnold, Baltimore, Edgewater, Gambrills, Hanover, Laurel, Severn, United States

Learn principles of food and beverage purchasing and cost controls as applied to food-service operations. Study the procurement and control of food, beverage, equipment, small wares, furniture, fixtures, and textiles, as well as current systems of food and labor cost controls. Discuss budgets for food service operations, and menu analysis, pricing and planning.

Implementing and Auditing the Critical Security Controls

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V


Apply a security framework based on actual threats that is measurable, scalable, and reliable in stop- ping known attacks and protecting organizations&,#146, important information and systems

## Understand the importance of each control, how it is compromised if ignored, and explain the defesive goals that result in quick wins and increased visibility of network and systems

## Identify and utilize tools that implement controls through automation

## Learn how to create a scoring tool for measuring the effectiveness of each controls the effectiveness of each control

## Employ specific metrics to establish a baseline and measure the effectiveness of security controls

## Understand how critical controls map to standards such as NIST 800-53, ISO 27002, the Australian Top 35, and more

## Audit each of the critical security controls, with specific, proven templates, checklists, and scripts provided to facilitate the audit process

Course Content

SEC566.1: Introduction and Overview of t... [Read More]

Securing Windows with PowerShell and the Critical Security Controls

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V

Use Group Policy to harden Windows and applications, deploy Microsoft EMET, do AppLocker whitelisting, apply security templates, and write your own PowerShell scripts.

Implement Dynamic Access Control (DAC) permissions, file tagging, and auditing for Data Loss Prevention (DLP).

Use Active Directory permissions and Group Policy to safely delegate administrative authority in a large enterprise to better cope with token abuse, pass-the-hash, service/task account hijacking, and other advanced attacks.

Install and manage a full Windows PKI, including smart cards, certificate auto-enrollment, and detection of spoofed root CAs.

Harden SSL, RDP, DNS, and other dangerous protocols.

Deploy Windows Firewall and IPSec rules through Group Policy and PowerShell.

Learn how to automate security tasks on local and remote systems with the PowerShell scripting language and remoting framework.

ICS Active Defense and Incident Response

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V

You Will Learn:
How to perform ICS incident response focusing on security operations and prioritizing the safety and reliability of operations.
How ICS threat intelligence is generated and how to use what is available in the community to support ICS environments. The analysis skills you learn will enable you to critically analyze and apply information from ICS threat intelligence reports on a regular basis.
How to identify ICS assets and their network topologies and how to monitor ICS hotspots for abnormalities and threats. Methodologies such as ICS network security monitoring and approaches to reducing the control system threat landscape will be introduced and reinforced.
How to analyze ICS malware and extract the most important information needed to quickly scope the environment and understand the nature of the threat.
How to operate through an attack and gain the information necessary to instruct teams and decision-makers on when operations must shut down, or if it is safe to respond to the threat and continue operations.
How to use multiple... [Read More]

Implementing and Auditing the Critical Security Controls

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge India
Training Center(s)/Venue(s): Bangalore, Chennai, Delhi, Pune, India
  V


Apply a security framework based on actual threats that is measurable, scalable, and reliable in stop- ping known attacks and protecting organizations&,#146, important information and systems

## Understand the importance of each control, how it is compromised if ignored, and explain the defesive goals that result in quick wins and increased visibility of network and systems

## Identify and utilize tools that implement controls through automation

## Learn how to create a scoring tool for measuring the effectiveness of each controls the effectiveness of each control

## Employ specific metrics to establish a baseline and measure the effectiveness of security controls

## Understand how critical controls map to standards such as NIST 800-53, ISO 27002, the Australian Top 35, and more

## Audit each of the critical security controls, with specific, proven templates, checklists, and scripts provided to facilitate the audit process

Course Content

SEC566.1: Introduction and Overview of t... [Read More]

Securing Windows with PowerShell and the Critical Security Controls

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge India
Training Center(s)/Venue(s): Bangalore, Chennai, Delhi, Pune, India
  V

Use Group Policy to harden Windows and applications, deploy Microsoft EMET, do AppLocker whitelisting, apply security templates, and write your own PowerShell scripts.

Implement Dynamic Access Control (DAC) permissions, file tagging, and auditing for Data Loss Prevention (DLP).

Use Active Directory permissions and Group Policy to safely delegate administrative authority in a large enterprise to better cope with token abuse, pass-the-hash, service/task account hijacking, and other advanced attacks.

Install and manage a full Windows PKI, including smart cards, certificate auto-enrollment, and detection of spoofed root CAs.

Harden SSL, RDP, DNS, and other dangerous protocols.

Deploy Windows Firewall and IPSec rules through Group Policy and PowerShell.

Learn how to automate security tasks on local and remote systems with the PowerShell scripting language and remoting framework.

ICS Active Defense and Incident Response

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge India
Training Center(s)/Venue(s): Bangalore, Chennai, Delhi, Pune, India
  V

You Will Learn:
How to perform ICS incident response focusing on security operations and prioritizing the safety and reliability of operations.
How ICS threat intelligence is generated and how to use what is available in the community to support ICS environments. The analysis skills you learn will enable you to critically analyze and apply information from ICS threat intelligence reports on a regular basis.
How to identify ICS assets and their network topologies and how to monitor ICS hotspots for abnormalities and threats. Methodologies such as ICS network security monitoring and approaches to reducing the control system threat landscape will be introduced and reinforced.
How to analyze ICS malware and extract the most important information needed to quickly scope the environment and understand the nature of the threat.
How to operate through an attack and gain the information necessary to instruct teams and decision-makers on when operations must shut down, or if it is safe to respond to the threat and continue operations.
How to use multiple... [Read More]

Implementing and Auditing the Critical Security Controls

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge Malaysia
Training Center(s)/Venue(s): Petaling Jaya, Malaysia
  V


Apply a security framework based on actual threats that is measurable, scalable, and reliable in stop- ping known attacks and protecting organizations&,#146, important information and systems

## Understand the importance of each control, how it is compromised if ignored, and explain the defesive goals that result in quick wins and increased visibility of network and systems

## Identify and utilize tools that implement controls through automation

## Learn how to create a scoring tool for measuring the effectiveness of each controls the effectiveness of each control

## Employ specific metrics to establish a baseline and measure the effectiveness of security controls

## Understand how critical controls map to standards such as NIST 800-53, ISO 27002, the Australian Top 35, and more

## Audit each of the critical security controls, with specific, proven templates, checklists, and scripts provided to facilitate the audit process

Course Content

SEC566.1: Introduction and Overview of t... [Read More]

Securing Windows with PowerShell and the Critical Security Controls

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge Malaysia
Training Center(s)/Venue(s): Petaling Jaya, Malaysia
  V

Use Group Policy to harden Windows and applications, deploy Microsoft EMET, do AppLocker whitelisting, apply security templates, and write your own PowerShell scripts.

Implement Dynamic Access Control (DAC) permissions, file tagging, and auditing for Data Loss Prevention (DLP).

Use Active Directory permissions and Group Policy to safely delegate administrative authority in a large enterprise to better cope with token abuse, pass-the-hash, service/task account hijacking, and other advanced attacks.

Install and manage a full Windows PKI, including smart cards, certificate auto-enrollment, and detection of spoofed root CAs.

Harden SSL, RDP, DNS, and other dangerous protocols.

Deploy Windows Firewall and IPSec rules through Group Policy and PowerShell.

Learn how to automate security tasks on local and remote systems with the PowerShell scripting language and remoting framework.

ICS Active Defense and Incident Response

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge Malaysia
Training Center(s)/Venue(s): Petaling Jaya, Malaysia
  V

You Will Learn:
How to perform ICS incident response focusing on security operations and prioritizing the safety and reliability of operations.
How ICS threat intelligence is generated and how to use what is available in the community to support ICS environments. The analysis skills you learn will enable you to critically analyze and apply information from ICS threat intelligence reports on a regular basis.
How to identify ICS assets and their network topologies and how to monitor ICS hotspots for abnormalities and threats. Methodologies such as ICS network security monitoring and approaches to reducing the control system threat landscape will be introduced and reinforced.
How to analyze ICS malware and extract the most important information needed to quickly scope the environment and understand the nature of the threat.
How to operate through an attack and gain the information necessary to instruct teams and decision-makers on when operations must shut down, or if it is safe to respond to the threat and continue operations.
How to use multiple... [Read More]

Implementing and Auditing the Critical Security Controls

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge Indonesia
Training Center(s)/Venue(s): Jakarta, Indonesia
  V


Apply a security framework based on actual threats that is measurable, scalable, and reliable in stop- ping known attacks and protecting organizations&,#146, important information and systems

## Understand the importance of each control, how it is compromised if ignored, and explain the defesive goals that result in quick wins and increased visibility of network and systems

## Identify and utilize tools that implement controls through automation

## Learn how to create a scoring tool for measuring the effectiveness of each controls the effectiveness of each control

## Employ specific metrics to establish a baseline and measure the effectiveness of security controls

## Understand how critical controls map to standards such as NIST 800-53, ISO 27002, the Australian Top 35, and more

## Audit each of the critical security controls, with specific, proven templates, checklists, and scripts provided to facilitate the audit process

Course Content

SEC566.1: Introduction and Overview of t... [Read More]

Securing Windows with PowerShell and the Critical Security Controls

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge Indonesia
Training Center(s)/Venue(s): Jakarta, Indonesia
  V

Use Group Policy to harden Windows and applications, deploy Microsoft EMET, do AppLocker whitelisting, apply security templates, and write your own PowerShell scripts.

Implement Dynamic Access Control (DAC) permissions, file tagging, and auditing for Data Loss Prevention (DLP).

Use Active Directory permissions and Group Policy to safely delegate administrative authority in a large enterprise to better cope with token abuse, pass-the-hash, service/task account hijacking, and other advanced attacks.

Install and manage a full Windows PKI, including smart cards, certificate auto-enrollment, and detection of spoofed root CAs.

Harden SSL, RDP, DNS, and other dangerous protocols.

Deploy Windows Firewall and IPSec rules through Group Policy and PowerShell.

Learn how to automate security tasks on local and remote systems with the PowerShell scripting language and remoting framework.

ICS Active Defense and Incident Response

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge Indonesia
Training Center(s)/Venue(s): Jakarta, Indonesia
  V

You Will Learn:
How to perform ICS incident response focusing on security operations and prioritizing the safety and reliability of operations.
How ICS threat intelligence is generated and how to use what is available in the community to support ICS environments. The analysis skills you learn will enable you to critically analyze and apply information from ICS threat intelligence reports on a regular basis.
How to identify ICS assets and their network topologies and how to monitor ICS hotspots for abnormalities and threats. Methodologies such as ICS network security monitoring and approaches to reducing the control system threat landscape will be introduced and reinforced.
How to analyze ICS malware and extract the most important information needed to quickly scope the environment and understand the nature of the threat.
How to operate through an attack and gain the information necessary to instruct teams and decision-makers on when operations must shut down, or if it is safe to respond to the threat and continue operations.
How to use multiple... [Read More]

Implementing and Auditing the Critical Security Controls

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge China
Training Center(s)/Venue(s): Guangzhou, China
  V


Apply a security framework based on actual threats that is measurable, scalable, and reliable in stop- ping known attacks and protecting organizations&,#146, important information and systems

## Understand the importance of each control, how it is compromised if ignored, and explain the defesive goals that result in quick wins and increased visibility of network and systems

## Identify and utilize tools that implement controls through automation

## Learn how to create a scoring tool for measuring the effectiveness of each controls the effectiveness of each control

## Employ specific metrics to establish a baseline and measure the effectiveness of security controls

## Understand how critical controls map to standards such as NIST 800-53, ISO 27002, the Australian Top 35, and more

## Audit each of the critical security controls, with specific, proven templates, checklists, and scripts provided to facilitate the audit process

Course Content

SEC566.1: Introduction and Overview of t... [Read More]

Securing Windows with PowerShell and the Critical Security Controls

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge China
Training Center(s)/Venue(s): Guangzhou, China
  V

Use Group Policy to harden Windows and applications, deploy Microsoft EMET, do AppLocker whitelisting, apply security templates, and write your own PowerShell scripts.

Implement Dynamic Access Control (DAC) permissions, file tagging, and auditing for Data Loss Prevention (DLP).

Use Active Directory permissions and Group Policy to safely delegate administrative authority in a large enterprise to better cope with token abuse, pass-the-hash, service/task account hijacking, and other advanced attacks.

Install and manage a full Windows PKI, including smart cards, certificate auto-enrollment, and detection of spoofed root CAs.

Harden SSL, RDP, DNS, and other dangerous protocols.

Deploy Windows Firewall and IPSec rules through Group Policy and PowerShell.

Learn how to automate security tasks on local and remote systems with the PowerShell scripting language and remoting framework.

ICS Active Defense and Incident Response

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge China
Training Center(s)/Venue(s): Guangzhou, China
  V

You Will Learn:
How to perform ICS incident response focusing on security operations and prioritizing the safety and reliability of operations.
How ICS threat intelligence is generated and how to use what is available in the community to support ICS environments. The analysis skills you learn will enable you to critically analyze and apply information from ICS threat intelligence reports on a regular basis.
How to identify ICS assets and their network topologies and how to monitor ICS hotspots for abnormalities and threats. Methodologies such as ICS network security monitoring and approaches to reducing the control system threat landscape will be introduced and reinforced.
How to analyze ICS malware and extract the most important information needed to quickly scope the environment and understand the nature of the threat.
How to operate through an attack and gain the information necessary to instruct teams and decision-makers on when operations must shut down, or if it is safe to respond to the threat and continue operations.
How to use multiple... [Read More]

Implementing and Auditing the Critical Security Controls

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge Singapore
Training Center(s)/Venue(s): Singapore, Singapore
  V


Apply a security framework based on actual threats that is measurable, scalable, and reliable in stop- ping known attacks and protecting organizations&,#146, important information and systems

## Understand the importance of each control, how it is compromised if ignored, and explain the defesive goals that result in quick wins and increased visibility of network and systems

## Identify and utilize tools that implement controls through automation

## Learn how to create a scoring tool for measuring the effectiveness of each controls the effectiveness of each control

## Employ specific metrics to establish a baseline and measure the effectiveness of security controls

## Understand how critical controls map to standards such as NIST 800-53, ISO 27002, the Australian Top 35, and more

## Audit each of the critical security controls, with specific, proven templates, checklists, and scripts provided to facilitate the audit process

Course Content

SEC566.1: Introduction and Overview of t... [Read More]

Securing Windows with PowerShell and the Critical Security Controls

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge Singapore
Training Center(s)/Venue(s): Singapore, Singapore
  V

Use Group Policy to harden Windows and applications, deploy Microsoft EMET, do AppLocker whitelisting, apply security templates, and write your own PowerShell scripts.

Implement Dynamic Access Control (DAC) permissions, file tagging, and auditing for Data Loss Prevention (DLP).

Use Active Directory permissions and Group Policy to safely delegate administrative authority in a large enterprise to better cope with token abuse, pass-the-hash, service/task account hijacking, and other advanced attacks.

Install and manage a full Windows PKI, including smart cards, certificate auto-enrollment, and detection of spoofed root CAs.

Harden SSL, RDP, DNS, and other dangerous protocols.

Deploy Windows Firewall and IPSec rules through Group Policy and PowerShell.

Learn how to automate security tasks on local and remote systems with the PowerShell scripting language and remoting framework.

Pages: 1 2 3 4 5 6 ...


Find Controls training courses, certificates, diplomas and degrees in Countries:



Australia - Canada - India - Indonesia - Ireland - Malaysia - Pakistan - Philippines - Singapore - South Africa - United Arab Emirates - United Kingdom - United States



Tips:
Try the search form on top of each page to find the latest course information, using course topic and location as keywords. Keep the course topic keyword short to get more results.



Automation
Controls
- Online/E-learning -
Controls
Ask for Training
Add Courses