Certified Ethical Hacker - CEHv10: Security Controls


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Explore Security policies and how they are used to protect information, systems, networks, and even physical threats, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to contrast Information Assurance from Information Security, explain the advantages of network segmentation, contrast types of workplace policies, create and develop basic security policies, identify opportunities to add physical security to a security policy, identify the differences in different physical security control types, and sequence the process of performing threat modeling.

Expected Duration (hours)
1.2

Lesson Objectives

Certified Ethical Hacker - CEHv10: Security Controls

  • contrast Information Assurance from Information Security
  • explain the advantages of network segmentation
  • contrast types of workplace policies
  • create and develop basic security policies
  • identify opportunities to add physical security to a security policy
  • identify the differences in different physical security control types
  • sequence the process of performing threat modeling
  • Course Number:
    it_spceh10tv_03_06_enus

    Expertise Level
    Intermediate