Search result for Certificate in cybersecurity and privacy Online Courses & Certifications
Get Course Alerts by Email
IBM Cybersecurity Analyst Assessment
by IBM Security Learning Services- 4.7
Approx. 4 hours to complete
This is the final course required to assess your acquired knowledge and skills from from the previous two specializations, IT Fundamentals of Cybersecurity and Security Analyst Fundamentals, to become job-ready for a cybersecurity analyst role. IBM Cybersecurity Analyst Professional Certificate Assessment Exam IBM Cybersecurity Analyst Professional Certificate Practice Exam IBM Cybersecurity Analyst Professional Certificate Assessment Exam Prep...
The GRC Approach to Managing Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.8
Approx. 10 hours to complete
● Identify the importance and functions of Governance, Risk Management, and Compliance in Cybersecurity program management. Law and Regulation in Cybersecurity Wrap up for Law and Regulation in Cybersecurity Wrap up for Law and Regulation in Cybersecurity Identify the importance and functions of Governance, Risk Management, and Compliance in Cybersecurity program management....
Cybersecurity in Healthcare (Hospitals & Care Centres)
by Jason H. Pridmore , Tessa A. P. Oomen- 4.6
Approx. 15 hours to complete
The course "Cybersecurity in Healthcare" has been developed to raise awareness and understanding the role of cybersecurity in healthcare (e. Even if you are not active in the healthcare domain, you will find helpful tips and insights to deal with cybersecurity challenges within any other organisation or in personal contexts as well. Cybersecurity in healthcare: technology, data, and human behaviour...
Design and Analyze Secure Networked Systems
by Edward Chow- 3.8
Approx. 15 hours to complete
We will learn Public Key Infrastructure (PKI) and Linux utility to serve as a CA for an organization, learn how to sign certificate request for clients or servers in secure email and web applications. Assess Cybersecurity Concepts and Security Principles Learned Be a CA, Setup Secure Server and Client Certificate Server Certificate and Installation...
Security Governance & Compliance
by Jacob Horne- 4.8
Approx. 9 hours to complete
Topics include the fundamental concepts and goals of cybersecurity (the CIA triad), security governance design, the NIST cybersecurity framework, relevant laws and regulations, and the roles of policies, strategies, and procedures in cybersecurity governance. Introduction to Cybersecurity Goals of Cybersecurity Legal and Regulatory Compliance Legal and Regulatory Compliance...
Cybersecurity and the Internet of Things
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Andy Green, Ph.D. , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.6
Approx. 11 hours to complete
You will explore current security and privacy related concerns in each of these areas. Welcome to Cybersecurity and the Internet of Things! Internet of Things – New security and privacy challenges IoT and its Use in Organizations Internet of Things Technology and its Application in Smart Grid A Survey on Internet of Things: Security and Privacy Issues...
Cybersecurity and Privacy in the IoT
by Iain Murray AM , Nazanin Mohammadi , Eleanor Sandry , Siavash Khaksar- 0.0
5 Weeks
Learn about the security and privacy implications of the IoT and how to design a secure system. As the Internet of Things (IoT) continues to grow so will the number of privacy and security concerns and issues. In this course, you will learn about security and privacy issues in IoT environments....
$199
Related searches
Palo Alto Networks Cybersecurity Essentials I
by James Dalton- 4.7
Approx. 18 hours to complete
Palo Alto Networks Cybersecurity Essentials I Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. LAB SETUP START HERE: Connecting to the NDG platform and performing labs. Essentials I: Module 4 - Cryptography, PKI, and Certificate Protection...
Cybersecurity Law & Policy
by Victoria Sutton- 4.1
2 hours on-demand video
Domestic and International Cybersecurity Law Cybersecurity Law is one of the most rapidly growing areas of law, and issues like privacy, cybercrime, bitcoin banking, international legal issues and internet governance are some of the important areas that will be covered in This course is about now and the future of cybersecurity law....
$9.99
Fundamentals of Social Media Advertising
by Daniel Kob- 4.9
Approx. 9 hours to complete
Learn how to work with design teams by capturing the essence of your ad campaign in a creative brief, and understand how privacy policies may affect your ads. • Build foundational understanding for data, data-based advertising and privacy protection Data, Privacy and Policies on Social Media Data, Privacy and Policies on Social Media Introduction...