Search result for Information security on alms Online Courses & Certifications
Get Course Alerts by Email
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. An introduction to knowledge areas in Information Security Professional bodies in the context of Information Security Careers in information Security A brief overview of professional bodies in the information security industry...
Cryptography and Information Theory
by Sang-Yoon Chang- 4.5
Approx. 8 hours to complete
Welcome to Cryptography and Information Theory! This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer). Security by Obscurity and Steganography, Part 1 Security by Obscurity and Steganography, Part 2 Kerckhoff's Principle and Security by Obscurity Information Entropy Information Entropy...
The Business of Cybersecurity Capstone
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Dr. Traci Carte , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Andy Green, Ph.D. , Michael Whitman, Ph.D., CISM, CISSP- 4.9
Approx. 17 hours to complete
This course intends to make the student familiar with information security management. • You will understand the various types of InfoSec policies and how effective information security policy is created and used. Governance and Strategic Planning in Information Security Governance and strategic planning in information security practice quiz Governance and strategic planning in information security quiz...
Palo Alto Networks Cybersecurity Essentials I
by James Dalton- 4.7
Approx. 18 hours to complete
Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Essentials I: Module 1 - Course Information Essentials I Course Information - Textbook, Workforce Roles Reading: Security Models Essentials I: Module 3 - Security Operating Platform / Firewall Technology...
Cyber Security in Manufacturing
by Shambhu Upadhyaya- 4.7
Approx. 22 hours to complete
Acquire knowledge about security needs and the application of information security systems. Information Security Framework - Part 1 Information Security Framework - Part 2 Application of Information Security - Part 1 Application of Information Security - Part 2 Additional (optional) Resources: Information Security Framework, Part 1 Additional (optional) Resources: Information Security Framework, Part 2...
A Guide to Security Information and Event Management - SIEM
by Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!- 3.8
16.5 hours on-demand video
Gain hands-on Tool insights using Splunk on Security information and event management and Security event manager You will gain real time insights on Security information and event management and Security event manager You will start using Splunk Enterprise Security Learn more on Security Devices, Encryption, Reliable passwords, use of anti-virus software and modern advanced network security devices....
$16.99
Cybersecurity and Its Ten Domains
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.3
Approx. 24 hours to complete
Introduction to Security, Access Control, and Software Development Security Introduction to Security Software Development Security Introduction to Security, Access Control, and Software Development Security Quiz Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Information Security Governance and Risk Management Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Quiz...
Related searches
Information Security Foundation based on ISOIEC 27002 exams
by Jonathan Wade- 0.0
Pass the certification on the first attempt. Information Security Foundation is a relevant certification for all professionals who work with confidential information within an IT context. If you want to become Information Security Foundation (based on ISO/IEC 27002) Certified quickly then getting latest new dumps, and practice exam is the easiest way to pass in shortest time...
$12.99
Software Design Threats and Mitigations
by Albert Glock- 4.7
Approx. 19 hours to complete
In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design. Open source threat and mitigation information Open source threat and mitigation information Building Security in Security as a build-on, not an add-on Active vs Passive security Active vs Passive security...
Privacy Law and HIPAA
by Lauren SteinfeldTop Instructor- 4.4
Approx. 12 hours to complete
Better understanding privacy laws and data protection will enable you to protect your organization and the constituents that depend on your organization to safeguard their personal information. We’ll explore the notion that one cannot have privacy without strong security and examine various models that promote the security of personal information. Fair Information Principles Compliance Observations in Information Security...