Explore Security policies and how they are used to protect information, systems, networks, and even physical threats.
CEHv10: Security Controls
- describe key security controls like information assurance, information security, network segmentation, defense-in-depth, and security policies
- include workplace policies, SecPol creation steps, HR, and Legal to begin the process to develop basic security policies
- describe physical security policies and explore risk management and threat modeling