Advanced Security: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 1: Line 1:
{| class="wikitable" style="border: none; background-color: transparent; width: 100%;"
{| class="wikitable" style="border: none; background-color: transparent; width: 100%;"
|-
|-
| colspan="3" style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | [[File:Elephants.png|frameless|225px|left|link=Advanced_Protection]]
| colspan="3" style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="display: flex; justify-content: center;"><div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[File:Elephants.png|frameless|225px|center|link=Advanced_Protection]]</div></div>
|-
|-
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Network Segmentation</div> <div style="padding: 5px;">[[File:network-segmentation.png|frameless|60px|left]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Network Segmentation</div> <div style="padding: 5px;">[[File:network-segmentation.png|frameless|60px|left]]</div>

Revision as of 23:44, 16 July 2023

Elephants.png
Network Segmentation
Intrusion Protection
Endpoint Protection
Security Event Management
Vulnerability Management
Penetration Testing
Incident Response
Configuration Management
Change Management
Identity & Access Management
Patch Management
Security Awareness