• Online, Self-Paced
Course Description

Explore Security policies and how they are used to protect information, systems, networks, and even physical threats.

Learning Objectives

CEHv10: Security Controls

  • describe key security controls like information assurance, information security, network segmentation, defense-in-depth, and security policies
  • include workplace policies, SecPol creation steps, HR, and Legal to begin the process to develop basic security policies
  • describe physical security policies and explore risk management and threat modeling

Framework Connections

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.