Common Security Issues and Controls
Explore risks like data leakage, environmental exposure, physical security breaches and more, and take a closer look at the controls that can save a system or prevent a loss.
Being prepared means knowing just how badly things might go wrong. In this course, five videos take you through the potential dangers that can affect your business and the controls you can implement to protect against them. Beginning with environmental exposures and controls, you move on to physical access exposure (such as unauthorized entry, damage, vandalism, embezzlement and blackmail) and controls; potential dangers of mobile, peer-to-peer computing and Web-based technologies; data leakage; and end-user computing security risks. Take control of your business environment today.
Environmental Exposures ControlsDuration: 5:45
Physical Access Exposure and ControlsDuration: 5:45
Mobile, Peer-to-peer Computing and Web-Based TechnologiesDuration: 10:20
Data LeakageDuration: 2:33
End-user Computing Security Risk and ControlsDuration: 1:15
Meet the author
At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers with a full regimen of certification and skills training. We also empower all employees with security awareness training to stay cybersecure at work and home. Driven by smart people wanting to do good, Infosec educates entire organizations on how to defend themselves from cybercrime. That’s what we do every day — equipping everyone with the latest security skills so the good guys win.
You're in good company
"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had."
"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."
"I’ve taken five boot camps with Infosec and all my instructors have been great."