Search result for Information security Online Courses & Certifications
Get Course Alerts by Email
Palo Alto Networks Cybersecurity Essentials I
by James Dalton- 4.7
Approx. 18 hours to complete
Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Essentials I: Module 1 - Course Information Essentials I Course Information - Textbook, Workforce Roles Reading: Security Models Essentials I: Module 3 - Security Operating Platform / Firewall Technology...
Cybersecurity Roles, Processes & Operating System Security
by IBM Security Learning Services- 4.6
Approx. 15 hours to complete
More information about the badge can be found here: https://www. Roles in Security Information Technology Infrastructure Library (ITIL) Overview Open Web Application Security Project (OWASP) Windows Operating System Security Basics Windows Operating System Security Basics Linux Operating System Security Basics Linux Operating System security basics macOS Security Basics macOS Security Settings...
The Foundations of Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 9 hours to complete
● Identify strategies to identify and remediate vulnerabilities in information assets Forces of Nature, Human Error or Failure & Information Extortion (Lecture 1. for module Managing Vulnerabilities in Information Assets The Cybersecurity Personnel and the Security Department (Lecture 1. The Cybersecurity Personnel and the Security Department (Quiz 1. Define strategies to identify and remediate vulnerabilities in information assets...
Check Point Jump Start: Maestro Hyperscale Network Security
by Check Point Software Technologies- 0.0
Approx. 4 hours to complete
In this course brought to you by industry leader Check Point, they will cover the Maestro Orchestrator initial installation, creation and configuration of security group via the web user interface and SmartConsole features. Introduction to the Check Point Maestro Hyperscale Network Security Solution...
Introduction to Cybersecurity for Business
by Greg Williams- 4.7
Approx. 12 hours to complete
This course approaches computer security in a way that anyone can understand. What is Practical Computer Security Introduction to Practical Computer Security Computer Security Key Definitions The Computer Security Environment Today Security Frameworks Glossary of Computer Security Terms Security Frameworks Week 1: Practical Computer Security Practical Application of Daily Security Week 4 - Daily Security...
CompTIA® Security+® Exam Prep
by QuickStart Learning Inc.- 3
9.5 hours on-demand video
CompTia Security Plus Exam SYO-501 Identify the essential components of information security Identify numerous threats which affect information security Deploy security for networks Deploy Security for hosts and software Detect vulnerability by conducting security assessments Address security incidents Deploy operational level security...
$12.99
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. Ethical considerations in general, and the (ISC)2 Code of Ethics in particular, provide the backdrop for any discussion of information security and SSCP candidates will be tested on both....
Privacy Law and Data Protection
by Lauren SteinfeldTop Instructor- 4.8
Approx. 12 hours to complete
We’ll explore the notion that one cannot have privacy without strong security and examine various models that promote the security of personal information. Fair Information Principles Fair Information Principles Security & Breach Notification Introduction to Security Compliance Observations in Information Security Data Security Summary of the HIPAA Security Rule Data Security Rules...
ISO/IEC 27001. Information Security Management System.
by Cristian Lupa- 4.4
5 hours on-demand video
Learn how your company can protect its information and get certified to ISO/IEC 27001 - work in a company that implemented an information security management system or - if you are manager or owner of a business you will know what is the international standard for information security and start implementing it in your company....
$14.99
Unlocking Information Security II: An Internet Perspective
by Avishai Wool , Dan Gittik- 0.0
7 Weeks
Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. A survey of the world wide web's security concerns (SQL Injections, CSRF, and XSS): is the Internet ultimately vulnerable or is there a silver lining?...
$149