CISO Security Controls: Data Controls

This is the fifth course in Ed Amoroso's 50 Security Controls, which covers the data controls derived from the TAG Cyber Fifty Enterprise Controls. The data controls provide students with a high-level overview of data security, encryption, and vulnerability management policy.

Time
57 minutes
Difficulty
Advanced
CEU/CPE
1
4.7
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

This Course is part of a Career Path: 50 CISO Security Controls
Course Content
Course Description

Dr. Amoroso provides an overview of Application Security, Content Protection, Data Destruction, Data Encryption, Digital Forensics, Identity and Access Management (IAM) and Identity Platforms, Compliance Support, and Vulnerability Management controls.

Instructed By
Ed Amoroso

Ed Amoroso

CEO, CSO, CISO of TAG Cyber

Instructor
Provider
Cybrary
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a CISO Security Controls: Data Controls Certificate of Completion

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.