Explore Security policies and how they are used to protect information, systems, networks, and even physical threats.
CEHv10: Security Controls
- describe key security controls like information assurance, information security, network segmentation, defense-in-depth, and security policies
- include workplace policies, SecPol creation steps, HR, and Legal to begin the process to develop basic security policies
- describe physical security policies and explore risk management and threat modeling
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.