Search result for Information security and risk management Online Courses & Certifications
Get Course Alerts by Email
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Operate and Secure Virtual Environments: Network Security Operate and Secure Virtual Environments: Virtual Machine Security Operate and Secure Virtual Environments: Network Security...
CISSP (ALL Domains 1,2,3,4,5,6,7 & 8) Security Professional
by Mukesh Singh- 0.0
7 hours on-demand video
Security and Risk ManagementAsset SecuritySecurity EngineeringCommunications and Network SecurityIdentity and Access ManagementSecurity Assessment and TestingSecurity OperationsSoftware Development Security Experienced IT security-related practitioners, auditors, consultants, investigators or instructors, including network or security analysts and engineers, network administrators, information security specialists and risk management professionals, who wish to advance their current computer security careers...
$12.99
Palo Alto Networks Academy Cybersecurity Foundation
by James Dalton- 4.7
Approx. 12 hours to complete
The CyberSecurity Survival Guide is a downloadable pdf file that presents information included in both the Foundation and Gateway classes as well as glossary ‘key’ terms and figures. Foundation - Module 1: Course Information Foundation Course Information - Textbook , Work Roles Compliance and Security Foundation Module 7 - Cloud and Data Center Security...
AWS Fundamentals: Going Cloud-Native
by Allen GoldbergTop Instructor , Morgan Willis , Blaine SundrudTop Instructor- 4.7
Approx. 9 hours to complete
This course will introduce you to Amazon Web Services (AWS) core services and infrastructure. Through demonstrations you'll learn how to use and configure AWS services to deploy and host a cloud-native application. Introduction to Module 5: Security and Cost Management Security and Cost Quiz Learn how to use AWS compute, storage, database, and security services via the AWS Console...
Introduction to Compliance Risk Management CRM
by Usman Zuberi- 4.2
1.5 hours on-demand video
Compliance risk management CRM for Compliance, Risk Management, Internal Audit and IS Security Professionals Why Board of Directors of companies are concerned about risk management and more specifically the compliance risk management CRM? This course will also make you understand how important is this now for internal audit, compliance and risk management to work together. Risk management professionals and students...
$12.99
CISSP - Certified Information Systems Security Professional
by Stone River eLearning- 4.6
7.5 hours on-demand video
CISSP Certification Course - Certified Information Systems Security Professional 2015 The CISSP: Certified Information Systems Security Professional Certification certification training package covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the eight domains of information system security knowledge. Security and Risk ManagementAsset SecuritySecurity EngineeringCommunications and Network SecurityIdentity and Access ManagementSecurity Assessment and TestingSecurity OperationsSoftware Development Security...
$19.99
Security Governance & Compliance
by Jacob Horne- 4.8
Approx. 9 hours to complete
Students are introduced to the field of cyber security with a focus on the domain of security & risk management. Topics include the fundamental concepts and goals of cybersecurity (the CIA triad), security governance design, the NIST cybersecurity framework, relevant laws and regulations, and the roles of policies, strategies, and procedures in cybersecurity governance....
Related searches
Enterprise and Infrastructure Security
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
Emerging security issues in blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection are also described for learners in the context of cyber risk. Mobile security and cloud security hyper-resilience approaches are also introduced. Security Awareness, Compliance, Assessments, and Risk Security Assessment and Audit Mobility Security and Deception Using Deception and Honey Pots for Security...
Networks and Communications Security
by (ISC)² Education & Training- 4.7
Approx. 20 hours to complete
Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted. Network-Based Security Devices: FIN, NULL, and XMAS Scanning...
The Foundations of Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 9 hours to complete
● Identify strategies to identify and remediate vulnerabilities in information assets Configuration and Change Management in Vulnerability Assessment (Lesson 1. Configuration and Change Management in Vulnerability Assessment (Quiz 1. The Cybersecurity Personnel and the Security Department (Lecture 1. The Cybersecurity Personnel and the Security Department (Quiz 1. Define strategies to identify and remediate vulnerabilities in information assets...