Course essentials
Boot camp at a glance
-
Method
Online, in-person, team onsite
-
Duration
5 days
-
Experience
1-3 years
What you'll learn
Training overview
Securing the United States against cyber-attacks has become one of the nation’s highest priorities. To achieve this objective, networks, systems, and the operations teams that support them must vigorously defend against external attacks. Furthermore, for those external attacks that are successful, defenses must be capable of thwarting, detecting and responding to follow-on attacks on internal networks as attackers spread inside a compromised network.
This group of 20 crucial controls is designed to begin the process of establishing a prioritized baseline of information security measures and controls that can be applied across enterprise environments. Fifteen of these controls can be monitored, at least in part, automatically and continuously. Five controls are essential but do not appear to be able to be monitored continuously or automatically with current technology and practices.
Award-winning training you can trust
What's included
Everything you need to know

- 90-day extended access to Boot Camp components, including class recordings
- 100% Satisfaction Guarantee
- Free 90-day Infosec Skills subscription (access to 1,400+ additional courses and labs)
- Knowledge Transfer Guarantee
Syllabus
Training schedule
Day 1
Information Security Overview
- Mitigating Threats
- Organizational Security
- User- and Role-based Security
- Authentication
- Peripheral Security
- Application and Messaging Security
- Cryptography
Information Security Overview continued
Schedule may vary from class to class
Day 2
Information Security Overview
- Public Key Infrastructure
- Network Security
- Ports and Protocols
- Wireless Security
- Remote Access Security
- Vulnerability Testing and Monitoring
- Business Continuity
Information Security Overview continued
Schedule may vary from class to class
Day 3
The Top 20 Controls
- Inventory of authorized and unauthorized devices
- Inventory of authorized and unauthorized software
- Secure configurations for hardware and software on workstations and servers
- Continuous vulnerability assessment
- Malware defenses
- Application software security
- Wireless device control
- Data recovery capability
The Top 20 Controls continued
Schedule may vary from class to class
Day 4
The Top 20 Controls continued
- Security skills assessment and appropriate training to fill gaps
- Secure configurations for network devices such as Firewalls, Routers, and Switches
- Limitation and control of network ports, protocols, and services
- Controlled use of administrative privileges
- Boundary defense
The Top 20 Controls continued
Schedule may vary from class to class
Day 5
The Top 20 Controls continued
- Maintenance, monitoring, and analysis of security audit logs
- Controlled access based on the need to know
- Account monitoring and control
- Data loss prevention
- Incident response management
- Secure network engineering
- Penetration tests and red team exercises
The Top 20 Controls continued
Schedule may vary from class to class
Guaranteed results
Our boot camp guarantees

100% Satisfaction Guarantee
If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.

Knowledge Transfer Guarantee
If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.
Unlock team training discounts
If you’re like many of our clients, employee certification is more than a goal — it’s a business requirement. Connect with our team to learn more about our training discounts.

You're in good company
The instructor was able to take material that prior to the class had made no sense, and explained it in real world scenarios that were able to be understood.
Erik Heiss, United States Air Force
I really appreciate that our instructor was extremely knowledgeable and was able to provide the information in a way that it could be understood. He also provided valuable test-taking strategies that I know not only helped me with this exam, but will help in all exams I take in the future.
Michelle Jemmott, Pentagon
The course was extremely helpful and provided exactly what we needed to know in order to successfully navigate the exam. Without this I am not confident I would have passed.
Robert Caldwell, Salient Federal Solutions
Explore our top boot camps
More learning opportunities
-
Most popularBoot camp
CompTIA Security+ Training Boot Camp
Infosec’s CompTIA Security+ Boot Camp teaches you information security theory and reinforces that theory with hands-on exercises to help you learn by doing. You’ll learn how to configure and operate many different technical security controls — and leave prepared to pass your Security+ exam.
Learn More
-
#1 FOR BEGINNERSBoot camp
Cisco CCNA Associate & CyberOps Associate Training Boot Camp with Dual Certification
Infosec’s authorized CCNA Dual Certification Boot Camp helps you build your knowledge of networking and provides hands-on experience installing, configuring and operating network devices — all while preparing you to earn two Cisco certifications.
Learn More
-
Most requestedBoot camp
(ISC)² CISSP® Certification Training and Boot Camp
Take your career to the next level by earning one of the most in-demand cybersecurity certifications. Infosec’s CISSP training provides a proven method for mastering the broad range of knowledge required to become a Certified Information Systems Security Professional.
Learn More