Search result for Security and compliance Online Courses & Certifications
Get Course Alerts by Email
Security Governance & Compliance
by Jacob Horne- 4.8
Approx. 9 hours to complete
Topics include the fundamental concepts and goals of cybersecurity (the CIA triad), security governance design, the NIST cybersecurity framework, relevant laws and regulations, and the roles of policies, strategies, and procedures in cybersecurity governance. Security Governance Security Governance Security Governance Legal & Regulatory Compliance Legal and Regulatory Compliance Legal and Regulatory Compliance...
Cybersecurity and Its Ten Domains
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.3
Approx. 24 hours to complete
Introduction to Security, Access Control, and Software Development Security Introduction to Security, Access Control, and Software Development Security Quiz Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Information Security Governance and Risk Management Legal, Regulations, Investigations, and Compliance Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Quiz...
Enterprise and Infrastructure Security
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Mobile security and cloud security hyper-resilience approaches are also introduced. Security Assessment and Audit Challenges of Compliance versus Security Video: “Addressing the Challenges of Complying with the Payment Card Industry Data Security Standard,” HALOCK Security Labs – Introduction to PCI Compliance...
Cybersecurity Compliance Framework & System Administration
by IBM Security Learning Services- 4.6
Approx. 16 hours to complete
This course gives you the background needed to understand the key cybersecurity compliance and industry standards. You will learn the concepts of endpoint security and patch management. National Institute of Standards and Technology (NIST) Special Publication 800-53 Catalog of Security Controls Compliance and Industry Standards Summary Compliance and Regulations for Cybersecurity Compliance Frameworks and Industry Standards...
Introduction to Cybersecurity
by Ron Woerner , CISSP , CISM , Jerry Smith , Christine Izuakor , PhD , CISSP , Sean Pike , Esq. , M.S.- 0.0
4 months
Get your start in the high growth field of Cybersecurity by building foundational skills in how to evaluate, maintain, and monitor the security of computer systems. You’ll also learn how to assess threats, respond to incidents, and implement security controls to reduce risk and meet security compliance goals....
$399
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. Document and operate security controls Understand and Comply with Code of Ethics and Security Concepts Security Operations and Administration Course Introduction...
The Business of Cybersecurity Capstone
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Dr. Traci Carte , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Andy Green, Ph.D. , Michael Whitman, Ph.D., CISM, CISSP- 4.9
Approx. 17 hours to complete
• You will understand the various types of InfoSec policies and how effective information security policy is created and used. Governance and Strategic Planning in Information Security Governance and strategic planning in information security practice quiz Governance and strategic planning in information security quiz An introduction to law, ethics, and compliance...
Related searches
G Suite Mail Management
by Google Cloud Training- 4.8
Approx. 6 hours to complete
In this course you will learn how to protect your organization against spam, spoofing, phishing and malware attacks. You will configure email compliance and learn how to implement data loss prevention (DLP) for your organization. You should have completed the Introduction to G Suite, Managing G Suite, and G Suite Security courses....
Google Workspace Mail Management
by Google Cloud Training- 4.8
Approx. 6 hours to complete
In this course you will learn how to protect your organization against spam, spoofing, phishing and malware attacks. You will configure email compliance and learn how to implement data loss prevention (DLP) for your organization. You should have completed the Introduction to Google Workspace Administration, Managing Google Workspace, and Google Workspace Security courses....
Palo Alto Networks Academy Cybersecurity Foundation
by James Dalton- 4.7
Approx. 12 hours to complete
In this course, students will learn the fundamentals of cybersecurity and identify the concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Foundation Module 2: Cyber-Landscape Careers and Common Attacks Video: Spamming and Phishing Compliance and Security Foundation Module 7 - Cloud and Data Center Security...