Search result for Security policies Online Courses & Certifications
Get Course Alerts by Email
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. An introduction to knowledge areas in Information Security Security Policies Security Policies Professional bodies in the context of Information Security Careers in information Security A brief overview of professional bodies in the information security industry...
NSE4 -Fortinet Network Security Professional -Practice Tests
by Practice Makes Perfect- 0.0
| Get Certified in NSE4 Exam | Pre-exam Practice | Pass in first attempt | Advance career in Fortinet Network Security | The Network Security Professional designation recognizes your ability to install and manage the day-to-day configuration, monitoring, and operation of a FortiGate device to support specific corporate network security policies....
$12.99
Amazon EKS Security and Networking Masterclass
by Karan Brar- 0.0
2.5 hours on-demand video
Learn Calico and AWS CNI plugins, Network and Pod Security Policies, CIS Benchmarks, Private API Endpoint, VPC Endpoint You will learn various security best practices based on CIS Benchmarks for Amazon EKS v1. Deploy Calico Network Policies Implement Pod Security Policies This course enables you to create EKS clusters and implement security best practices....
$12.99
Managing Security in Google Cloud
by Google Cloud Training- 4.7
Approx. 7 hours to complete
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Welcome to Managing Security in Google Cloud Foundations of Google Cloud Security Foundations of Google Cloud Security IAM Policies VPCs for Isolation and Security Load balancing and SSL policies VPCs for Isolation and Security Understand the Google approach to security...
Palo Alto Firewall PCNSE Training
by Ahmad Ali- 4.4
32 hours on-demand video
This course dives deeper into Palo Alto firewalls policies and network configuration to give the students a clear understanding on several topics. Topics covered include Security Policies configuration, SSL Decryption, Routing configuration, IPsec configuration, High Availability configuration and other real world configuration examples. Understand Palo Alto Firewalls Security Policies...
$13.99
G Suite Security
by Google Cloud Training- 4.7
Approx. 6 hours to complete
G Suite Security is the third course in the G Suite Administration series. In this course you will focus on the various aspects of G Suite Security including user password policies and how to enable and enforce two step verification (2SV) for your users. G Suite Security Introduction to Common Security Settings...
Google Workspace Security
by Google Cloud Training- 4.7
Approx. 6 hours to complete
Google Workspace Security is the third course in the Google Workspace Administration series. In this course you will focus on the various aspects of Google Workspace Security including user password policies and how to enable and enforce two step verification (2SV) for your users. G Suite Security Introduction to Common Security Settings...
Related searches
Planning, Auditing and Maintaining Enterprise Systems
by Greg Williams- 4.7
Approx. 12 hours to complete
Organizations also rely on organizational policies, such as Acceptable Use Policies to bolster the technical aspect of system management. The first half of the course covers how to build security into system management process and the organization policies necessary for any enterprise to follow. Policies - Part 1: Organizational Policies Policies - Part 2: Technical Policies...
Mitigating Security Vulnerabilities on Google Cloud
by Google Cloud Training- 4.7
Approx. 8 hours to complete
They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization's security policies. Welcome to Mitigating Security Vulnerabilities on Google Cloud Security Partner Products Security Command Center overview Demo: Using Security Command Center...
The Business of Cybersecurity Capstone
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Dr. Traci Carte , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Andy Green, Ph.D. , Michael Whitman, Ph.D., CISM, CISSP- 4.9
Approx. 17 hours to complete
This course intends to make the student familiar with information security management. • You will understand the various types of InfoSec policies and how effective information security policy is created and used. What is security management? Governance and Strategic Planning in Information Security How organizations structure the security function How organizations make strategic plans for security...