CISO Security Controls: Data Controls
This is the fifth course in Ed Amoroso's 50 Security Controls, which covers the data controls derived from the TAG Cyber Fifty Enterprise Controls. The data controls provide students with a high-level overview of data security, encryption, and vulnerability management policy.

LEARN MORE. ACHIEVE MORE.
Deciphering the essentials to enter a new career is hard, so we did it for you!
Focus on building your skills and take this course in a guided Career Path.
Dr. Amoroso provides an overview of Application Security, Content Protection, Data Destruction, Data Encryption, Digital Forensics, Identity and Access Management (IAM) and Identity Platforms, Compliance Support, and Vulnerability Management controls.



Complete this entire course to earn a CISO Security Controls: Data Controls Certificate of Completion
See the full benefits of our immersive learning experience with interactive courses and guided career paths.