Search result for Security management Online Courses & Certifications
Get Course Alerts by Email
Identity & Access Management-Learn LDAP, SAML, OAuth, OPENID
by Varinder K- 3.5
2.5 hours on-demand video
Identity Access management and Identity Security It is a foundational security component to help ensure users have the access they need, and that systems, data, and applications are inaccessible to unauthorized users. What is Identity Management Access Management Security Token Service Concept Identity Security...
$13.99
FinTech Security and Regulation (RegTech)
by Theodore Henry King CLARK- 4.6
Approx. 15 hours to complete
You will learn about how FinTech and RegTech disrupt and transform finance industry, such as challenges in protecting data and security with digital forensics, risk management and corporate governance in banking industry in terms of Know Your Customer (KYC) and Anti Money Laundering (AML), and how governments in different countries take initiatives in FinTech and RegTech....
Cybersecurity and the X-Factor
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Dr. Traci Carte , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Andy Green, Ph.D. , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 12 hours to complete
Security and Employee Compliance Industry Q&A: Security and End Users MISQ Executive: Information Security Management Overview Shadow IT: Mitigating Security Risks Security Education: Training & Awareness Industry Q&A: Customers and Security Training Security Education, Training and Awareness Making Security Awareness Work Security Education: Training and Awareness Quiz Employee Habits, Errors, and Security Breaches...
On Premises Management, Security, and Upgrade with Google Cloud's Apigee API Platform
by Google Cloud Training- 4.7
Approx. 2 hours to complete
This course discusses the management and operation of the Apigee platform for private cloud. It includes topics on operational practices, API deployment, analytics, security and upgrade of the platform. Module 3 - Platform Security Security Overview Configure TLS on the Management Server Discuss the role of the Apigee management API and how it is used to manage the platform....
Cybersecurity Roles, Processes & Operating System Security
by IBM Security Learning Services- 4.6
Approx. 15 hours to complete
Roles in Security Business Process Management Overview Business Process Management and IT Infrastructure Library Basics Open Web Application Security Project (OWASP) Windows Operating System Security Basics Windows Operating System Security Basics Linux Operating System Security Basics Linux Operating System security basics macOS Security Basics macOS Security Settings Cloud Benefits, Security and Governance...
Check Point Jump Start: Maestro Hyperscale Network Security
by Check Point Software Technologies- 0.0
Approx. 4 hours to complete
In this course brought to you by industry leader Check Point, they will cover the Maestro Orchestrator initial installation, creation and configuration of security group via the web user interface and SmartConsole features. Introduction to the Check Point Maestro Hyperscale Network Security Solution...
International Security Management
by Gabriele Jacobs , Dominique Lapprand , Anthony Thompson , Bernat Vivolas Jordà , Lola Valles , Milton Sousa , Fabio Bisogni , Jonathan Saunders , Alice Raven- 4.7
Approx. 9 hours to complete
In this MOOC you will learn about the colorful and diverse international security landscape, and gain insights into challenging topics including Open Source Intelligence, serious organised crime and illicit trade. Key organisations with a security function Environmental security & migration (case study) The international security landscape Managing security Leadership in security management...
Related searches
Certified Information Systems Security Professional @2019
by Integrity Training- 4.3
15.5 hours on-demand video
Certified Information Systems Security Professional @2019 The Certified Information Systems Security Professional course is a preparatory course for the CISSP certification exam provided by (ISC)2, the world’s leading cybersecurity and IT security professional organization. The candidates are able to gain knowledge in information security that increases their ability to successfully implement and manage security programs in any organization....
$19.99
Enterprise and Infrastructure Security
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks. Security Awareness Using Video for Security Awareness Security Assessment and Audit Challenges of Compliance versus Security Video: “Addressing the Challenges of Complying with the Payment Card Industry Data Security Standard,” HALOCK Security Labs – Introduction to PCI Compliance...
Managing Security in Google Cloud
by Google Cloud Training- 4.7
Approx. 7 hours to complete
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Welcome to Managing Security in Google Cloud Foundations of Google Cloud Security Foundations of Google Cloud Security Cloud Identity and Access Management (Cloud IAM) Cloud Identity and Access Management (Cloud IAM) VPCs for Isolation and Security...