• Online, Self-Paced
Course Description

Explore Security policies and how they are used to protect information, systems, networks, and even physical threats.

Learning Objectives

CEHv10: Security Controls

  • describe key security controls like information assurance, information security, network segmentation, defense-in-depth, and security policies
  • include workplace policies, SecPol creation steps, HR, and Legal to begin the process to develop basic security policies
  • describe physical security policies and explore risk management and threat modeling

Framework Connections