Search result for Online Courses & Certifications
Get Course Alerts by Email
Access Controls
by (ISC)² Education & Training- 4.7
Approx. 15 hours to complete
Welcome to Access Controls! The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level or group membership....
IT Security: Defense against the digital dark arts
by Google Career CertificatesTop Instructor- 4.8
Approx. 30 hours to complete
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting....
Information Systems Auditing, Controls and Assurance
by Garvin Percy DIAS- 4.7
Approx. 9 hours to complete
The course is awarded Best Online Courses of the Year (2021 Edition) by Class Central (http://www. classcentral. com). --- Information systems (IS) are important assets to business organizations and are ubiquitous in our daily lives. Management in organizations also need to be assured that systems work the way they expected. IS auditors play a crucial role in handling these issues....
Cybersecurity Roles, Processes & Operating System Security
by IBM Security Learning Services- 4.6
Approx. 15 hours to complete
This course gives you the background needed to understand basic Cybersecurity around people. process and technology. You will learn: ● Understand the key cybersecurity roles within an Organization. ● List key cybersecurity processes and an example of each process. ● Describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux and Mobile....
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk. Once an incident is identified, action will be necessary in order to resolve....
Penetration Testing, Incident Response and Forensics
by IBM Security Learning Services- 4.6
Approx. 17 hours to complete
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will learn about the different phases of penetration testing, how to gather data for your penetration test and popular penetration testing tools. Finally, you will learn key steps in the forensic process and important data to collect....
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined....
Cyber Threat Intelligence
by IBM Security Learning Services- 4.7
Approx. 29 hours to complete
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will understand network defensive tactics, define network access control and use network monitoring tools. You will understand data protection risks and explore mobile endpoint protection. More information about the badge can be found https://www....
IBM Cybersecurity Analyst Assessment
by IBM Security Learning Services- 4.7
Approx. 4 hours to complete
A growing number of exciting, well-paying jobs in today’s security industry do not require a college degree. This is the final course required to assess your acquired knowledge and skills from from the previous two specializations, IT Fundamentals of Cybersecurity and Security Analyst Fundamentals, to become job-ready for a cybersecurity analyst role....
Cybersecurity Capstone: Breach Response Case Studies
by IBM Security Learning Services- 4.8
Approx. 16 hours to complete
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will explore incident response methodologies and security models. You will learn to recognize and categorize key types of vulnerabilities and associated attacks against today's organizations. This project will be graded by your peers in the course....