CISO Security Controls: Endpoint Controls
This is the third course in Ed Amoroso’s 50 Security Controls, which covers the endpoint controls derived from the TAG Cyber Fifty Enterprise Controls.
Course Description
The endpoint controls provide students with an executive high-level strategy in understanding trends in endpoint security tools, IoT security, and identity and access management.
Dr. Amoroso provides an overview of Anti-Malware Tools, Endpoint Security, Hardware and Embedded Security, Industrial Control System (ICS) and Internet of Things (IoT) Security, Mainframe Security, Mobile Security, Password and Privilege Management, Multi-Factor Authentication, and Voice Security controls
Dr. Amoroso provides an overview of Anti-Malware Tools, Endpoint Security, Hardware and Embedded Security, Industrial Control System (ICS) and Internet of Things (IoT) Security, Mainframe Security, Mobile Security, Password and Privilege Management, Multi-Factor Authentication, and Voice Security controls
Module 1: Endpoint Controls
User Reviews
Be the first to review “CISO Security Controls: Endpoint Controls”
You must be logged in to post a review.
There are no reviews yet.