Search result for Security incidents Online Courses & Certifications
Get Course Alerts by Email
Design and Analyze Secure Networked Systems
by Edward Chow- 3.8
Approx. 15 hours to complete
In this MOOC, we will learn the basic cyber security concepts, how to identify vulnerabilities/threat in a network system. We will apply CIA basic security services in the triage of recent cyberattack incidents, such as OPM data breach. Security Principles: Defense in Depth, Defense with Diversity, Cyber Resilience Assess Cybersecurity Concepts and Security Principles Learned...
AWS Certified Security – Specialty SCS-C01 [New]
by Chandra Lingam- 4.6
14.5 hours on-demand video
Many thanks for putting together this course that steers a Security Specialty aspirant in the right path. ***Cleared my AWS Security - Specialty exam today. Hi, and welcome to the AWS Certified Security – Specialty course! I recently got my security specialty certification, and I want to share my learning with you....
$17.99
NISPOM Fundamentals, Chapter 1
by Jeff Bennett- 5
2.5 hours on-demand video
This is great training for seasoned and new Facility Security Officers, new Cleared Defense Contractors, Cleared Employees, and those studying for Industrial Security Professional (ISP) and Industrial Security Professional Oversight Certification (ISOC): Security Cognizance Facility Security Officer (FSO) Security Training and Briefings Security Reviews Reports to DoD About Cyber Incidents On Cleared Defense Contractors (CDCs) ISs...
$12.99
Ethical Hacking for Beginners
by Experts with David Bombal- 4.7
11.5 hours on-demand video
The curriculum is designed for absolute beginners interested in a career as a security professional, beginning with the absolute basics of penetration testing, and progressing to advanced topics and techniques. The goal of ethical hacking is to find security vulnerabilities in an organization’s digital systems and networks....
$14.99
Data Loss Prevention (DLP) in the Enterprise!
by Risal Nasar- 0.0
1 hour on-demand video
The right way to implement Data Security in modern organizations. Data Loss Incidents Data Security Policy...
$12.99
Cybersecurity Awareness and Innovation
by Iván Martínez , Iván Pau , Román Ramírez- 4.7
Approx. 7 hours to complete
Public Key encryption is not security...
Configuring Fortigate Unified Threat Management Appliances
by Daniel Botescu- 0.0
4.5 hours on-demand video
Build up your network security knowledge by learning how to use the no. By the end of this course you will be able to transform your network security with a very powerful device and have the solid skills that you can use in the future to expand your knowledge....
$12.99
Related searches
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. Perform security assessment activities Perform Security Assessment Activities Security Assessment Activities: Participate in Security and Test Results Security Assessment Activities: Potential Problems Monitoring Results: Security Baseline...
ISO 27001 Cybersecurity manager. Guidelines.
by Cristian Lupa- 4.4
4 hours on-demand video
- human resources security - from screening to employment, the contractual requirements and disciplinary process plus the termination and change of employment - access controls and authentication aspects plus how to manage privileges so they won't generate security breaches - controls that refer to physical security and equipment - requirements for email security...
$15.99
IFCI Expert Cybercrime Investigator's Course
by Brian Hussey- 0.0
16.5 hours on-demand video
IT Security Team - Rogue Malware Case: You discover malware on an internal corporate computer but you don’t know what it does or why it’s there....
$174.99