Search result for Information security management specialization Online Courses & Certifications
Get Course Alerts by Email
Palo Alto Networks Cybersecurity Essentials II
by James Dalton- 4.7
Approx. 14 hours to complete
Essentials II provides the student with a full understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Essentials II : Module 1 - Course Information Essentials II Course Information - Textbook, Workforce Roles Reading: Risk Management Framework Essentials II: Module 4 - Mobile / Cloud Security...
Designing data-intensive applications
by María del Pilar Ángeles- 0.0
Approx. 7 hours to complete
Welcome to the specialization course of Designing data-intensive applications. By the end of this specialization, learners will be able to propose, design, justify and develop high reliable information systems according to type of data and volume of information, response time, type of processing and queries in order to support scalability, maintainability, security and reliability considering the last information technologies....
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. Describe the risk management process Perform security assessment activities Understand the Risk Management Process Risk Management Process: Risk Visibility and Reporting Monitoring Results: Security Baseline SSCP Exam Information...
Asymmetric Cryptography and Key Management
by Sang-Yoon Chang- 4.7
Approx. 9 hours to complete
This course will first review the principles of asymmetric cryptography and describe how the use of the pair of keys can provide different security properties. Security of RSA Key Distribution and Management Lecture Slides for Key Distribution and Management Key Distribution and Management...
Palo Alto Networks Academy Cybersecurity Foundation
by James Dalton- 4.7
Approx. 12 hours to complete
Course 1 of 5 in the Palo Alto Networks Security Operating Platform Cybersecurity Specialization. Foundation - Module 1: Course Information Foundation Course Information - Textbook , Work Roles Foundation Module 6 - Network Security Models Video: Network Security Models I Video: Network Security Models II Network Security Models Compliance and Security...
Cyber Security in Manufacturing
by Shambhu Upadhyaya- 4.7
Approx. 22 hours to complete
Acquire knowledge about security needs and the application of information security systems. Information Security Framework - Part 1 Information Security Framework - Part 2 Application of Information Security - Part 1 Application of Information Security - Part 2 Additional (optional) Resources: Information Security Framework, Part 1 Additional (optional) Resources: Information Security Framework, Part 2...
A Guide to Security Information and Event Management - SIEM
by Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!- 3.8
16.5 hours on-demand video
Gain hands-on Tool insights using Splunk on Security information and event management and Security event manager You will gain real time insights on Security information and event management and Security event manager , examples, purpose of incident response, cyber security incidents, meantime to resolution, incident management process, Logs from security monitoring and logging tools, Detection, Prevention and Protection...
$16.99
Related searches
Cybersecurity and the X-Factor
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Dr. Traci Carte , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Andy Green, Ph.D. , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 12 hours to complete
The course will conclude with information designed to assist you with some critical components for your business security program. Security and Employee Compliance Industry Q&A: Security and End Users MISQ Executive: Information Security Management Overview Shadow IT: Mitigating Security Risks Security Education: Training & Awareness Industry Q&A: Customers and Security Training...
Cybersecurity Roles, Processes & Operating System Security
by IBM Security Learning Services- 4.6
Approx. 15 hours to complete
More information about the badge can be found here: https://www. Roles in Security Business Process Management Overview Information Technology Infrastructure Library (ITIL) Overview Business Process Management and IT Infrastructure Library Basics Open Web Application Security Project (OWASP) Windows Operating System Security Basics Windows Operating System Security Basics Linux Operating System Security Basics...
Cybersecurity Risk Management
by Tong Sun- 0.0
8 Weeks
In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. You will learn the details of how to apply these frameworks in assessing information security risk. Information security risk management framework and methodologies...
$249