Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Cybrary
  4. CISO Security Controls: Data Controls

CISO Security Controls: Data Controls

This is the fifth course in Ed Amoroso's 50 Security Controls, which covers the data controls derived from the TAG Cyber Fifty Enterprise Controls. The data controls provide students with a high-level overview of data security, encryption, and vulnerability management policy.

Course Overview

Overall Proficiency Level
3 - Advanced
Course Prerequisites

N/A

Training Purpose
Skill Development
Management Development
Specific Audience
All
General Public
Delivery Method
Online, Self-Paced
  • Online, Self-Paced

Learning Objectives

Dr. Amoroso provides an overview of Application Security, Content Protection, Data Destruction, Data Encryption, Digital Forensics, Identity and Access Management (IAM) and Identity Platforms, Compliance Support, and Vulnerability Management controls.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: