Advanced Security: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
{| class="wikitable" style="border: none; background-color: transparent; width: 100%;" | {| class="wikitable" style="border: none; background-color: transparent; width: 100%;" | ||
|- | |||
| colspan="3" style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Placeholder Content</div> | |||
|- | |- | ||
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Network Segmentation</div> <div style="padding: 5px;">[[File:network-segmentation.png|frameless|60px|center]]</div> | | style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Network Segmentation</div> <div style="padding: 5px;">[[File:network-segmentation.png|frameless|60px|center]]</div> |
Revision as of 23:36, 16 July 2023
Placeholder Content
| ||
Network Segmentation
|
Intrusion Protection
|
Endpoint Protection
|
Security Event Management
|
Vulnerability Management
|
Penetration Testing
|
Incident Response
|
Configuration Management
|
Change Management
|
Identity & Access Management
|
Patch Management
|
Security Awareness
|