5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Security     Security Accreditations and Best Practice     Certified Ethical Hacker (CEH) v10
Explore Security policies and how they are used to protect information, systems, networks, and even physical threats, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to contrast Information Assurance from Information Security, explain the advantages of network segmentation, contrast types of workplace policies, create and develop basic security policies, identify opportunities to add physical security to a security policy, identify the differences in different physical security control types, and sequence the process of performing threat modeling.

Objectives

Certified Ethical Hacker - CEHv10: Security Controls

  • contrast Information Assurance from Information Security
  • explain the advantages of network segmentation
  • contrast types of workplace policies
  • create and develop basic security policies
  • identify opportunities to add physical security to a security policy
  • identify the differences in different physical security control types
  • sequence the process of performing threat modeling