Purpose Statement
Cybrary Career Paths are comprehensive training programs designed to prepare you for the most in-demand roles in the cybersecurity workforce. Each path follows a Learn, Practice, Prove model and includes different activity types aligned to key topics within the path’s security domain. As you progress through the path, your progress will be measured in real time using Experience Points (XP) that serve as a comprehensive capability score for each topic. Upon completing all of the requirements for a path, you will be rewarded with a shareable digital badge via Credly.
5
H
31
M
Time
intermediate
difficulty
0
ceu/cpe
Overview
The Security Controls are an essential component of the CRISC certification, and provide you with the information you need to ensure that your organization’s cybersecurity infrastructure has the maturity and structure it needs to meet and exceed the demands of a changing market. The controls are derived from the TAG Cyber Fifty Enterprise Controls and cover major trends in enterprise, network, endpoint, governance, data, and industry control areas. In each session, the most important aspects of past, present, and future operation are covered, with high-level emphasis on how emerging trends in cloud, mobility, virtualization, analytics, and automation affect and influence each control area.
Frequently Asked Questions
No items found.
Path Outline
CISO Security Controls: Enterprise Controls
This is the first course in Ed Amoroso's 50 Security Controls, which covers the enterprise controls derived from the TAG Cyber Fifty Enterprise Controls. The enterprise controls provide students with an executive high-level strategy with which to secure their organization from threats, data breach, and intrusion.
CISO Security Controls: Network Controls
This is the second course in Ed Amoroso's 50 Security Controls, which covers the network controls derived from the TAG Cyber Fifty Enterprise Controls. The network controls provide students with an executive high-level strategy in network security and covers trends in the network control areas.
CISO Security Controls: Governance Controls
This is the fourth course in Ed Amoroso's 50 Security Controls, which covers the governance controls derived from the TAG Cyber Fifty Enterprise Controls. The governance controls provide students with executive strategies, to implement and maintain a variety of dynamic security management domains.
CISO Security Controls: Data Controls
This is the fifth course in Ed Amoroso's 50 Security Controls, which covers the data controls derived from the TAG Cyber Fifty Enterprise Controls. The data controls provide students with a high-level overview of data security, encryption, and vulnerability management policy.
CISO Security Controls: Industry Controls
This is the sixth course in Ed Amoroso's 50 Security Controls, which covers the industry controls derived from the TAG Cyber Fifty Enterprise Controls. The industry controls provide students with an executive anlysis of trends in the security industry in valued training and development.
No items found.
No items found.