Search result for Security management system Online Courses & Certifications
Get Course Alerts by Email
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined....
Introduction to Enterprise Computing
by Jeff Bisti- 4.7
Approx. 10 hours to complete
Mainframe Operating System Operating System Mainframe Operating system Mainframe Security and Start-up z/OS Security Security addendum Transaction level security Crypto Express Key Management IPLing an operating system z/OS MVS System Initialization Logic Initial Program Load (IPL) z/OS Security Transaction level security Crypto express key management IPLing an operating system Describe the process of IPLing an operating system...
Enterprise System Management and Security
by Greg Williams- 4.7
Approx. 12 hours to complete
This course is for anyone who is exploring what it might take to have a job as a system administrator or for those who are already specialized in one area of system management and would like to move to another. Good system management starts with knowing security Risk in System Management...
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. An introduction to knowledge areas in Information Security System Security Tools Security Management Professional bodies in the context of Information Security...
Cybersecurity Roles, Processes & Operating System Security
by IBM Security Learning Services- 4.6
Approx. 15 hours to complete
The completion of this course also makes you eligible to earn the Cybersecurity Roles, Processes & Operating System Security IBM digital badge. Welcome to People, Process and Operating System Fundamentals for Cybersecurity Windows Operating System Security Basics Windows Operating System Security Basics Linux Operating System Security Basics Linux Operating System security basics...
Protecting Cloud Architecture with Alibaba Cloud
by Steve Xue- 0.0
Approx. 12 hours to complete
Cloud Platform Security Overview: https://edu. Cyber Security Today Security Risk Evaluation Alibaba Cloud Security Products Overview Security Products Demo Security Center Console Overview Security Overview Linux User Management Linux LVM Management Host Security Security Challenge to Hosts in Cloud Host Security Management 5 Key Points Windows Security Configuration Demo Window System Vulnerability Detection...
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. Describe the risk management process Perform security assessment activities Understand the Risk Management Process Risk Management Process: Risk Visibility and Reporting Monitoring Results: Security Baseline...
Related searches
Cybersecurity Compliance Framework & System Administration
by IBM Security Learning Services- 4.6
Approx. 16 hours to complete
Payment Card Industry Data Security Standard (PCI DSS) Center for Internet Security (CIS) Critical Security Controls National Institute of Standards and Technology (NIST) Special Publication 800-53 Catalog of Security Controls Center for Internet Security (CIS) Critical Security Controls Understand the concept of patching and endpoint protection as it relates to client system administration....
The GRC Approach to Managing Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.8
Approx. 10 hours to complete
This course examines the role of Governance, Risk Management, and Compliance (GRC) as part of the Cybersecurity management process, including key functions of planning, policies, and the administration of technologies to support the protection of critical information assets. Information Security Management System Specific Security Policies Introduction to Key Security Laws US and International Security Laws and Standards...
ISO/IEC 27001. Information Security Management System.
by Cristian Lupa- 4.4
5 hours on-demand video
My course explains the requirements of ISO/IEC 27001 along with the controls in Annex A of this standard to help you understand how an information security management system can be implemented, what are the requirements of this standard and what are the solutions to ensure conformity. - work in a company that implemented an information security management system or...
$14.99