Search result for Information security and risk management Online Courses & Certifications
Get Course Alerts by Email
Management and financial accounting: Know your numbers 1
by Dr John-Paul Monck- 4.7
Approx. 14 hours to complete
This course will provide you with a sound foundational understanding of financial and management accounting, and how to use accounting to facilitate and align decisions made by owners, managers and employees. You’ll learn how to organise, create, interpret and communicate important financial information effectively, which will help you improve your organisation’s internal procedures and processes....
Cybersecurity Capstone: Breach Response Case Studies
by IBM Security Learning Services- 4.8
Approx. 16 hours to complete
You will explore incident response methodologies and security models. You will explore in depth several past and recent breaches to learn how they were detected and what was done or could have been done to reduce the threat risk to the organization. Incident Management Response and Cyberattack Frameworks Incident Management Response and Cyberattack Frameworks Graded Assessment...
Identify Theft Prevention
by Lisa Newton- 4
1.5 hours on-demand video
These days the risk of fraudulent activity and identity theft are at an all time high because people are so lose and open with their personal information! If you are on social media platforms such as Facebook or LinkedIn and you have your entire 'CV' and life on there. •Search engines and URL security...
$12.99
Algo Trading Without Any Coding
by Rajan Dhall- 0.0
1.5 hours on-demand video
There are elements of technical analysis, risk management and systems development in this course. Therefore, algorithmic trading uses a series of instructions and parameters in order to initiate The more information and parameters used by the entry and trade management. human element once the system is switched on, and we can see that any emotional risk is therefore...
$12.99
SAP Cyber Security
by Alexander Polyakov- 0.0
3 hours on-demand video
SAP Cyber Security beyond Segregation of Duties - learn how to earn a 6-digit salary in the new cybersecurity market Interest in SAP security is growing exponentially and the numerous I will start with the history of SAP Cyber Security and why and how SAP Cyber angles from secure coding and SoD to vulnerability management and threat ...
$15.99
Deploying SAP on Google Cloud
by Google Cloud Training- 4.6
Approx. 6 hours to complete
Participants will learn to configure SAP on Google Cloud, and what best practices are, leaving the course with actionable experience to configure SAP on Google Cloud and run SAP workloads on Google Cloud. Security Deployment and Automation Integration and Innovation Getting Started with Google Cloud and Qwiklabs Architecting SAP on Google Cloud - Disaster Recovery & Data Management...
Investments II: Lessons and Applications for Investors
by Scott Weisbenner- 4.8
Approx. 19 hours to complete
In this course, you will start by reviewing the fundamentals of investments, including the trading off of return and risk when forming a portfolio, asset pricing models such as the Capital Asset Pricing Model (CAPM) and the 3-Factor Model, and the efficient market hypothesis. Basics of Return and Risk Information Networks and Performance...
Related searches
Planning and Executing a Financial Statement Audit
by Illumeo Learning- 3.4
1 hour on-demand video
In this course we learn how public accountants plan and execute an audit. An audit enhances the value of financial information by making it more trustworthy and credible. This course covers audit process, evidence, risk models and core audit principles. Planning and Executing a Financial Statement AuditPart Corporate Internal Controls and Fraud Controls Part...
$14.99
Cybersecurity and Mobility
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.5
Approx. 14 hours to complete
Effective cybersecurity must be multi-dimensional and tiered, as threats can originate from virtually anywhere, target numerous levels of an organization, and sometimes persist for months or years before an information security staff is aware of an attack or breach. SAP's Chris and Mandy on BYOD and Policy Management Effective Information Security Requires a Balance of Social and Technology Factors....
Smart Grids: The Basics
by Peter Palensky , Jose Rueda Torres , Kaikai Pan , Ibrahim Diab- 0.0
6 Weeks
Learn about their heterogeneity, dynamics, control, and about security and assessment strategies. Its study, design, and management requires the integration of knowledge from various disciplines including sustainability, technology and mathematics. Analyze intelligent electrical power system dynamics (frequency stability) to achieve active power balance, and Identify control-room technologies for system-wide remote monitoring, protection and risk management of smart grid cyber security....
$99