• Online, Self-Paced
Course Description

Security controls play a critical role in effective cybersecurity management. Properly planning and implementing security controls helps to provide protection for a wide variety of infrastructures within an organization. Through this course, explore tactical approaches for planning and implementing security controls.

Learn about planning and executing on-premises physical and environmental protection. Next, discover how protection works for operating systems and storage. Finally, explore communication object resource protection in a cloud data center, cloud identity management (IdM), and auditing mechanisms.

This is one of a collection of courses that fully prepares the learner for the ISC2 Certified Cloud Security Professional (CCSP) 2022 exam.

Learning Objectives

{"discover the key concepts covered in this course"}

Framework Connections