CISO Security Controls: Endpoint Controls

Cybrary
Course

This is the third course in Ed Amoroso's 50 Security Controls, which covers the endpoint controls derived from the TAG Cyber Fifty Enterprise Controls.

Time
59 minutes
Difficulty
Advanced
CEU/CPE
1
4.5
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

This Course is part of a Career Path: Become a CISO
Course Content
Module 1: Endpoint Controls

LEARN MORE. ACHIEVE MORE.

Follow A Path

Deciphering the essentials to enter a new career is hard, so we did it for you!

Focus on building your skills and take this course in a guided Career Path.

Course Description

The endpoint controls provide students with an executive high-level strategy in understanding trends in endpoint security tools, IoT security, and identity and access management.

Dr. Amoroso provides an overview of Anti-Malware Tools, Endpoint Security, Hardware and Embedded Security, Industrial Control System (ICS) and Internet of Things (IoT) Security, Mainframe Security, Mobile Security, Password and Privilege Management, Multi-Factor Authentication, and Voice Security controls

Instructed By
Ed Amoroso
Ed Amoroso
CEO, CSO, CISO of TAG Cyber
Instructor
Provider
Cybrary
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a CISO Security Controls: Endpoint Controls Certificate of Completion

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.