From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,800 courses taught by industry experts.

Understanding information security controls

Understanding information security controls

From the course: Certified Ethical Hacker (CEH)

Understanding information security controls

- So let's go over information security controls. And information security controls are essential measures that are designed to protect information assets from many different threats. And these controls will, again, ensure the three elements of the CIA triad: Confidentiality, integrity, and availability. Now, what you're seeing in front of your screen right now is basically a reference around the information security control elements that are relevant for the exam, but also are relevant for anybody that is starting in cybersecurity. Now, this is in my GitHub repository, and if you're not familiar with my GitHub repository, you can actually access it very easily, just hackerrepo.org. It will redirect you to this repository. And this has a significant amount of information about cybersecurity, whether you're practicing for a test or want to learn more about exploit development, AI security, many different security best practices, reverse engineering, reconnaissance, and so on. I also…

Contents