Overview

This is the fifth course in Ed Amoroso's 50 Security Controls, which covers the data controls derived from the TAG Cyber Fifty Enterprise Controls. The data controls provide students with a high-level overview of data security, encryption, and vulnerability management policy.

Course Content

Module 1: Data Controls

57:09
1.1 Data Controls

Course Description

Dr. Amoroso provides an overview of Application Security, Content Protection, Data Destruction, Data Encryption, Digital Forensics, Identity and Access Management (IAM) and Identity Platforms, Compliance Support, and Vulnerability Management controls.

Instructed By

Instructor Profile Image
Ed Amoroso
Instructor

Provided By

Certificate of Completion

Certificate Of Completion

Complete this course and earn a CISO Security Controls: Data Controls Certificate of Completion