This is the third course in Ed Amoroso's 50 Security Controls, which covers the endpoint controls derived from the TAG Cyber Fifty Enterprise Controls.
Learning Objectives
The endpoint controls provide students with an executive high-level strategy in understanding trends in endpoint security tools, IoT security, and identity and access management. Dr. Amoroso provides an overview of Anti-Malware Tools, Endpoint Security, Hardware and Embedded Security, Industrial Control System (ICS) and Internet of Things (IoT) Security, Mainframe Security, Mobile Security, Password and Privilege Management, Multi-Factor Authentication, and Voice Security controls
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):