Search result for Security controls Online Courses & Certifications
Get Course Alerts by Email
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. Document and operate security controls Security Concepts: Additional Controls Security Controls: Deterrent, Preventive, Detective, and Corrective Controls Security Concepts: Additional Controls Security Controls: Deterrent, Preventive, Detective, and Corrective Controls...
IS20 Security Controls
by Integrity Training- 0.0
3 hours on-demand video
IS20 Security Controls The IS20 Security Controls training course is based on the official Mile2’s vendor neutral IS20 Controls certification objectives and covers the proven general controls and methodologies that are used to execute and analyze the twenty most critical security controls. The course focuses on the twenty most critical controls suggested by the leading government and private organizations....
$12.99
Introduction to Cybersecurity for Teachers
by Mac Bowley- 0.0
3
Device Security Network Security Physical Security Network Controls and Firewalls...
Free
Introduction to Cybersecurity
by Ron Woerner , CISSP , CISM , Jerry Smith , Christine Izuakor , PhD , CISSP , Sean Pike , Esq. , M.S.- 0.0
4 months
Get your start in the high growth field of Cybersecurity by building foundational skills in how to evaluate, maintain, and monitor the security of computer systems. You’ll also learn how to assess threats, respond to incidents, and implement security controls to reduce risk and meet security compliance goals....
$399
ISO 27001 Cybersecurity manager. Guidelines.
by Cristian Lupa- 4.4
4 hours on-demand video
- access controls and authentication aspects plus how to manage privileges so they won't generate security breaches - a short description of most popular cryptograhpic attacks (brute force, rainbow tables or birthday attacks) and recommended controls - controls that refer to physical security and equipment - network security aspects - principles and controls + wireless attacks and how to prevent them...
$15.99
Security Best Practices in Google Cloud
by Google Cloud Training- 4.6
Approx. 13 hours to complete
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs....
ISO/IEC 27001. Information Security Management System.
by Cristian Lupa- 4.4
5 hours on-demand video
My course explains the requirements of ISO/IEC 27001 along with the controls in Annex A of this standard to help you understand how an information security management system can be implemented, what are the requirements of this standard and what are the solutions to ensure conformity. - work in a company that implemented an information security management system or...
$14.99
Related searches
SAP Audit
by SAP Training Now & OJAYO SAP education university- 0.0
7.5 hours on-demand video
SAP Audit focusing on compliance and security in sap for beginners. SAP Governance and security is an advanced security+governance course which covers various technology areas starting from security, audit, internal controls, sox and risk management. Governance and security go hand in hand. Governance of SAP security with SAP compliance processes and best practices in today a primary focus area....
$12.99
OWASP Proactive Controls
by Stone River eLearning- 0.0
3 hours on-demand video
OWASP Proactive Controls The OWASP: Proactive Controls course is part of a series of training courses on the Open Web Application Security Project (OWASP). The OWASP Top Ten Proactive Controls is a list of security techniques that should be included in every software development project....
$12.99
Cybersecurity Compliance Framework & System Administration
by IBM Security Learning Services- 4.6
Approx. 16 hours to complete
You will learn the concepts of endpoint security and patch management. Payment Card Industry Data Security Standard (PCI DSS) Center for Internet Security (CIS) Critical Security Controls National Institute of Standards and Technology (NIST) Special Publication 800-53 Catalog of Security Controls Center for Internet Security (CIS) Critical Security Controls System and Organization Controls Report (SOC) Overview CIS Critical Security Controls...