Course Description
This is the fifth course in Ed Amoroso's 50 Security Controls, which covers the data controls derived from the TAG Cyber Fifty Enterprise Controls. The data controls provide students with a high-level overview of data security, encryption, and vulnerability management policy.
Learning Objectives
Dr. Amoroso provides an overview of Application Security, Content Protection, Data Destruction, Data Encryption, Digital Forensics, Identity and Access Management (IAM) and Identity Platforms, Compliance Support, and Vulnerability Management controls.
Framework Connections
Specialty Areas
- Cybersecurity Management
- Program/Project Management and Acquisition
- Executive Cyber Leadership
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.