Search result for Information security and risk management Online Courses & Certifications
Get Course Alerts by Email
Introduction to Database Management Systems (DBMS)
by Edoreal Learning Solutions- 3.8
1 hour on-demand video
Learn Fundamental Concepts of Database Management from scratch Information is not useful if not organized. Database Management System (DBMS) is used to input, sort, organize and store data. Database Management System (DBMS) is a Software for data storage & retrieval, for creating user interface (forms), reports, and for administering a DB system (security, access, etc....
$11.99
CompTIA Cybersecurity Analyst (CySA+) Express Bootcamp
by Joseph Holbrook (The Cloud Tech Guy)- 0.0
9.5 hours on-demand video
Ive been teaching Cloud Security Manager, Security Plus, CASP and CSA to hundreds of Dept of Defense professionals. Bureau of Labor Statistics (BLS) predicts that information security analysts will be the fastest growing overall job category, with 37 percent overall growth between 2012 and 2022. A career in information security analysis ranked seventh on U....
$12.99
The Basics of Cyber Security 2020
by Faisal Ammari- 4.1
1 hour on-demand video
Trigger your Cyber Security journey with the basics you need to learn. Definition and key terms and concepts in the field of cybersecurity Identify and distinguish cyber threats and protection Explore the cyber risk management Know how to plan and write Business Continuity...
$14.99
Communicate Effectively about Ethical Challenges in Data-Driven Technologies
by Renée Cummings , Jennifer Fischer , Megan Smith Branch- 0.0
Approx. 14 hours to complete
Communication to stakeholders will guide an organization's strategy and potentially impact the future of work for that organization or entity. Ethical Risk Categories Design Diverse, Equitable, and Inclusive External Communication Strategies The Importance of Diversity, Equity, and Inclusiveness Diverse, Equitable, and Inclusive Communication Strategies Mission and Vision Statement Reputational Risk Management...
Network and Security Foundations
by Gerri Light , Ryan Whisler- 0.0
8 Weeks
The course also introduces basic concepts of security, covering vulnerabilities of networks and mitigation techniques, security of physical media, and security policies and procedures. The course introduces the concepts and practices associated with network security vulnerabilities, threats, risk mitigation, and the policies and procedures associated with security management. The functional and technical components of network systems...
$299.7
Securing Investment Returns in the Long Run
by University of Geneva- Tony Berrada , University of Geneva- Ines Chaieb , University of Geneva- Jonas Demaurex , University of Geneva- Rajna Gibson Brandon , University of Geneva- Michel Girardin , University of Geneva- Philipp Krueger , University of Geneva- Kerstin Preuschoff , University of Geneva- Olivier Scaillet , University of Geneva- Philip Valta- 4.8
Approx. 8 hours to complete
In this course, you will learn about the famous dichotomy between active and passive investing, how to appropriately measure and analyze investment performance and what the future trends in the investment management industry are. Finally, you will explore the worlds of sustainable finance, neurofinance and fintech, three areas of research that will shape the future of the investment management industry....
Become Zero to hero in Risk Management Fundamentals
by Varinder K- 4.8
2 hours on-demand video
Section 2 describes the Risk Management Terminologies, and and you will learn below concepts: Section 3 discusses Risk Management Frameworks and you will learn below concepts: NIST (SP 800-37), Risk Management framework for Federal Information systems Section 4 discusses Risk Management Process - 50,000 ft Overview and you will learn below concepts:...
$11.99
Related searches
Managing Secrets with Hashicorp Vault
by Chris Parent- 0.0
5.5 hours on-demand video
Having a solid defense-in-depth and risk management plan is key to protecting your organization's digital assets. Governance is a process that defines how secrets are created, protected, rotated, distributed, revoked, and destroyed. The governance process may also cover who can access what secrets and when. Generate and management dynamic secrets such as AWS access tokens or database credentials...
$14.99
Public Health in Humanitarian Crises 2
by Gilbert Burnham, MD , Mija Ververs- 4.8
Approx. 12 hours to complete
Sometimes referred to as auditing, enrolling without a certificate means that you will have access to all of the videos and discussions. Module 5: International Health Regulations and the Global Health Security Agenda (Lauren Sauer) Introduction to International Health Regulations and the Global Health Security Agenda International Health Regulations and the Global Health Security Agenda Quiz...
Storytelling That Delivers Program and Project Outcomes
by Bill Brantley- 0.0
5 Weeks
Risk management for programs and projects is more effective when using compelling narratives. In this online course of the Program Management and the Art of Communication certificate program, you will learn how great program and project managers use their storytelling skills to create compelling project visions, persuade stakeholders, and design effective risk management strategies....
$199