Search result for Security planning Online Courses & Certifications
Get Course Alerts by Email
Cybersecurity and Its Ten Domains
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.3
Approx. 24 hours to complete
Introduction to Security, Access Control, and Software Development Security Introduction to Security Software Development Security Introduction to Security, Access Control, and Software Development Security Quiz Business Continuity and Disaster Recovery Planning and Cryptography Business Continuity and Disaster Recovery Planning Business Continuity and Disaster Recovery Planning and Cryptography Quiz Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance...
The GRC Approach to Managing Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.8
Approx. 10 hours to complete
Information Security Management Cybersecurity Governance and Planning (Module 2. Cybersecurity Governance and Planning Introduction to Key Security Laws US and International Security Laws and Standards Information Security and Law Introduction to Key Security Laws US and International Security Laws and Standards Describe the structure and content of Cybersecurity-related strategy, plans, and planning...
Managing and Securing the Apigee Hybrid API Platform
by Google Cloud Training- 0.0
Approx. 4 hours to complete
You will also learn how to deploy and debug API proxies in Apigee hybrid, and about capacity planning and scaling. Security Infrastructure security Module Quiz : Security Capacity Planning and Scaling Capacity Planning Module Quiz : Capacity Planning and Scaling...
The Business of Cybersecurity Capstone
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Dr. Traci Carte , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Andy Green, Ph.D. , Michael Whitman, Ph.D., CISM, CISSP- 4.9
Approx. 17 hours to complete
This course intends to make the student familiar with information security management. What is security management? Governance and Strategic Planning in Information Security How organizations structure the security function How organizations make strategic plans for security Governance and strategic planning in information security practice quiz Governance and strategic planning in information security quiz...
Enterprise and Infrastructure Security
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks. Security Awareness Using Video for Security Awareness Security Assessment and Audit Challenges of Compliance versus Security Video: “Addressing the Challenges of Complying with the Payment Card Industry Data Security Standard,” HALOCK Security Labs – Introduction to PCI Compliance...
CompTIA® Security+® Exam Prep
by QuickStart Learning Inc.- 3
9.5 hours on-demand video
CompTia Security Plus Exam SYO-501 It can also be undertaken if you are planning to take the CompTIA Security+ certification examination. Identify the essential components of information security Identify numerous threats which affect information security Deploy security for networks Deploy Security for hosts and software Address security incidents Deploy operational level security...
$12.99
Cloud Security Basics
by Rick Smith- 4.7
Approx. 13 hours to complete
We'll learn and apply classic security techniques to today’s cloud security problems. We’ll analyze recent cloud security vulnerabilities using standard, systematic techniques. We’ll build our own web service case studies and construct security solutions for them. An overview of Cloud Security Basics Internet Service Security Security Controls: Packet Filtering Cloud Architecture and Security Planning...
Related searches
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. Perform security assessment activities Monitoring Results: Security Baseline Incident Handling: Communication Planning Incident Handling: Communication Planning BCP and DRP: Disaster Recovery Planning BCP and DRP: Disaster Recovery Planning...
Cybersecurity and the X-Factor
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Dr. Traci Carte , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Andy Green, Ph.D. , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 12 hours to complete
Security and Employee Compliance Industry Q&A: Security and End Users MISQ Executive: Information Security Management Overview Shadow IT: Mitigating Security Risks Security Education: Training & Awareness Industry Q&A: Customers and Security Training Security Education, Training and Awareness Making Security Awareness Work Security Education: Training and Awareness Quiz Employee Habits, Errors, and Security Breaches...
Reliable Google Cloud Infrastructure: Design and Process
by Google Cloud Training- 4.7
Approx. 8 hours to complete
Disaster Planning Activity Intro: Disaster planning Activity Review: Disaster planning Security Security Concepts Network Security Security Cost Planning Activity Intro: Cost estimating and planning Activity Review: Cost estimating and planning...