Component Security

Component security focuses on the design, procurement, testing, analysis, and maintenance of components integrated into larger systems. Classes covered CYB-240 Application Security, CYB-300 System and Communication Security, CYB-400 Security Assessment and Auditing, CYB-410 Security Risk Management.  

Mobile Device Management (MDM)

Mobile Device Management (MDM) such as Kandji, allows IT departments to monitor, configure, and secure mobile devices used by employees to access company data. Organizations use MDM to manage and secure these devices while ensuring efficient productivity. Organizations apply security policies, processes, and configurations to mobile devices to protect corporate data. MDM can also monitor and track equipment location, status, ownership and activity.

Endpoint Isolation

Endpoint isolation is a crucial technique used in cybersecurity to protect networks and systems. When an endpoint (such as a computer or server) is compromised, isolating it helps prevent further damage and mitigate risks. Here are some reasons why you should isolate a compromised endpoint: Once a compromised endpoint  has been discovered, the act of isolating the affected endpoint can interrupt attack chains and prevent the movement of threats within the network.

OWASP Top 10:

The OWASP Top Ten is widely adopted across industries as the de facto framework for identifying and mitigating web application vulnerabilities. It’s used by developers, auditors, and CISOs to align security practices with global best standards. The list is based on real-world data from thousands of organizations and security experts. It highlights the most common and impactful vulnerabilities, like Broken Access Control, Injection, and Security Misconfiguration, that attackers actively exploit.