Search result for Security Online Courses & Certifications
Get Course Alerts by Email
Enterprise System Management and Security
by Greg Williams- 4.7
Approx. 12 hours to complete
The world runs on computers. Your watch, your TV, your car. You might be familiar on how to operate each of these. Your home computer you are even more familiar with operating it. But what does it take to really take computer systems to the next level? - The enterprise level....
Linux Server Management and Security
by Greg Williams- 4.6
Approx. 13 hours to complete
Whether you are accessing a bank website, Netflix or your home router, chances are that your computer is interacting with a Linux system. The world runs on Linux. In this course, we will dive into how Linux works from an enterprise perspective. In week 1 we will look at what Linux is used for in the enterprise....
Windows Server Management and Security
by Greg Williams- 4.7
Approx. 12 hours to complete
Microsoft Windows has been at the forefront of enterprise computing for several decades. What most office workers see is the desktop side – such as Windows 7, 8 or 10. This course explores what it takes to design and build the server side of Windows in an enterprise environment. Week 3 will explore authorization in a Windows environment....
Detecting and Mitigating Cyber Threats and Attacks
by Greg Williams- 4.7
Approx. 12 hours to complete
Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the attack, and just give credit monitoring out as if nothing happened....
Planning, Auditing and Maintaining Enterprise Systems
by Greg Williams- 4.7
Approx. 12 hours to complete
Good system management not only requires managing the systems themselves, but requires careful planning to make systems interact with each other, auditing of the systems once the systems are built, and proactive maintenance of all systems. Organizations also rely on organizational policies, such as Acceptable Use Policies to bolster the technical aspect of system management....
Road to the CISO – Culminating Project Course
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 5
Approx. 18 hours to complete
The ultimate destination for a security manager is the Chief Information Security Officer (or Chief Security Officer) a senior executive role responsible for all cybersecurity operations in the organization. But how do you get from entry-level IT or security employee to the CISO’s office and what do you need to know when you get there?...
Proactive Computer Security
by Greg Williams- 4.7
Approx. 11 hours to complete
I’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them? ” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll learn how to proactively test what you have put in place to protect your data....
Cryptography
by (ISC)² Education & Training- 4.8
Approx. 14 hours to complete
Welcome to Cryptography! Cryptography is the practice and study of techniques for securing communications in the presence of third parties. You will learn how to protect information in order to ensure its integrity, confidentiality, authenticity, and non-repudiation. Course Objectives 1. Apply the fundamental concepts of cryptography 2. Describe the difference between symmetric and asymmetric cryptography...
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Both technical and non-technical attacks will be discussed. You will learn how an organization can protect itself from these attacks. Objectives...
Check Point Jump Start: Network Security
by Check Point Software Technologies- 0.0
Approx. 5 hours to complete
In this course brought to you by industry leader Check Point, they will cover cybersecurity threats and elements of Check Point's Security Management architecture. This course will prepare you for the exam, #156-412, at PearsonVUE. (https://home. pearsonvue. com/checkpoint) Introduction to the Check Point Solution Introduction to the Check Point Solution Deploying Check Point Security Management...