Search result for Cybersecurity management certificate Online Courses & Certifications
Get Course Alerts by Email
Security Governance & Compliance
by Jacob Horne- 4.8
Approx. 9 hours to complete
Topics include the fundamental concepts and goals of cybersecurity (the CIA triad), security governance design, the NIST cybersecurity framework, relevant laws and regulations, and the roles of policies, strategies, and procedures in cybersecurity governance. Introduction to Cybersecurity Goals of Cybersecurity...
Tech for Good: The Role of ICT in Achieving the SDGs
by Tech for Good Faculty , Dorothy Gordon , Guilherme Canela Godoi , José Clastornik- 0.0
10 Weeks
What opportunities and challenges do digital technologies present for the development of our society? Tech for Good was developed by UNESCO and Cetic. br/NIC. br, the Brazilian Network Information Center’s Regional Center for Studies on the Development of the Information Society. This course is for: Financial assistance is available through edX....
$49
Introduction to Database Queries
by Aspen Olmsted- 0.0
5 Weeks
Learn the fundamentals of interacting with relational database management systems, including issuing queries that return results sets and modify data. The applied SQL labs expand on the classroom lectures to provide students with hands-on experience with a relational database management system (RDBMS) and structured query language (SQL)....
$166
Advanced Database Queries
by Aspen Olmsted- 0.0
5 Weeks
Learn the fundamentals of interacting with relational database management systems, including issuing advanced queries that return complicated results sets. Applied labs expand on the lectures to provide students with hands-on experience with a relational database management system (DBMS) and structured query language (SQL)....
$166
Advanced Database Administration
by Aspen Olmsted- 0.0
5 Weeks
Learn the fundamentals of administering relational database management systems, including managing concurrency and creating objects in the database Applied labs expand on the lectures to provide students with hands-on experience with a relational database management system (DBMS) and structured query language (SQL)....
$166
Design and Analyze Secure Networked Systems
by Edward Chow- 3.8
Approx. 15 hours to complete
We will learn the risk management framework for analyzing the risks in a network system, and apply the basic security design principles to protect the data and secure computer systems. Cybersecurity Concepts Assess Cybersecurity Concepts and Security Principles Learned Be a CA, Setup Secure Server and Client Certificate Server Certificate and Installation...
TOTAL: Active Directory with Windows Server 2016
by Total Seminars • 750,000+ Enrollments- 4.5
6.5 hours on-demand video
Total Seminars, your source for best-selling IT network and cybersecurity courses, brings you this informative course on Active Directory with Barbara Andrews, MCT, MCSE, MCITP, MCSA, MCDBA, and MCP. Implement Active Directory Certificate services 3 Install and configure Active Directory Rights Management Services (AD RMS)...
$15.99
Related searches
Cybersecurity and Its Ten Domains
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.3
Approx. 24 hours to complete
Participants will gain knowledge and understanding of cybersecurity and its domains. The Importance of Cybersecurity Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Information Security Governance and Risk Management Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Quiz Course Certificate Final Exam...
IT Security: Defense against the digital dark arts
by Google Career CertificatesTop Instructor- 4.8
Approx. 30 hours to complete
Software Patch Management How to Add Google IT Support Certificate to Your Resume and LinkedIn Profile...
Hands-on: Complete Penetration Testing and Ethical Hacking
by Muharrem AYDIN- 4.5
19.5 hours on-demand video
Ping Scan to Enumerate Network HostsPort Scan with NmapSYN Scan, TCP Scan, UDP ScanVersion & Operating System DetectionInput & Output Management in NmapNmap Scripting EngineHow to Bypass Security Measures in Nmap ScansSome Other Types of Scans: XMAS, ACK, etc. Udemy Certificate of Completion Ready for Download...
$21.99