Component Security
Component security focuses on the design, procurement, testing, analysis, and maintenance of components integrated into larger systems. Classes covered CYB-240 Application Security, CYB-300 System and Communication Security, CYB-400 Security Assessment and Auditing, CYB-410 Security Risk Management.
Mobile Device Management (MDM)
Mobile Device Management (MDM) such as Kandji, allows IT departments to monitor, configure, and secure mobile devices used by employees to access company data. Organizations use MDM to manage and secure these devices while ensuring efficient productivity. Organizations apply security policies, processes, and configurations to mobile devices to protect corporate data. MDM can also monitor and track equipment location, status, ownership and activity.
Endpoint Isolation
Endpoint isolation is a crucial technique used in cybersecurity to protect networks and systems. When an endpoint (such as a computer or server) is compromised, isolating it helps prevent further damage and mitigate risks. Here are some reasons why you should isolate a compromised endpoint: Once a compromised endpoint has been discovered, the act of isolating the affected endpoint can interrupt attack chains and prevent the movement of threats within the network.