Search result for Security strategy Online Courses & Certifications
Get Course Alerts by Email
Detecting and Mitigating Cyber Threats and Attacks
by Greg Williams- 4.7
Approx. 12 hours to complete
This is the third course in the Practical Computer Security specialization. By the end of the course you should be able to make suggestions on what type of detection and mitigation strategy is right for your systems or business given the known threats and attack vectors. Splunk and Security...
Spycam Detection in Workplace Expectation of Privacy Areas
by Kevin D. Murray- 4.4
1 hour on-demand video
It also provides a complete due diligence strategy to help organizations protect their employees, customers and visitors against this privacy invasion. security managers,facilities managers,store managers,security officers,private investigators,landlords,real estate management companies,targets of activist groups,and businesses which invite the public into their locations....
$9.99
Intro to AR/VR/MR/XR: Technologies, Applications & Issues
by Michael Nebeling- 4.7
Approx. 28 hours to complete
Privacy & Security Privacy and Security Discussion: Privacy and Security Concerns XR Strategy Developing Your XR Strategy Module 4 of 4: XR Strategy Developing Your XR Strategy XR Strategy Panel XR Strategy Quiz...
Web application Penetration testing & Security
by Atul Tiwari- 0.0
9 hours on-demand video
Hunting bugs in Web applications from security perspective - Web application security tester - Beginner to Advanced The same strategy has been covered in this course....
$14.99
Digitalization in International Relations
by Yarygin Grigory , Sytnik Anna , Tsvetkova Natalia , Stadnik Ilona- 4.5
Approx. 16 hours to complete
Issues relating to cybersecurity and information security are also discussed in the course and reviewed in terms of international agendas. Cybersecurity and Information Security National Cyber/Information Security Strategies...
IBM Data Privacy for Information Architecture
by Christopher Giardina , Aaron Ritchie- 4.7
Approx. 10 hours to complete
Data privacy vs security Data privacy vs security introduction The difference between data privacy and security Security mechanisms Data privacy vs security Data topologies, use cases, and the data strategy perspective...
IT Security Fundamentals: CompTIA Security+ 2015
by LearnSmart LLC- 0.0
24.5 hours on-demand video
Welcome to IT Security Fundamentals: CompTIA Security+ 2015 from LearnSmart. Section 28: What kind of security measures do you take to protect your facilities, equipment, resources, personnel, and property from damage caused by unauthorized access? Security is very important to any organization and physical security is no exception. While monitoring, it looks for suspicious activities and security policy violations....
$199.99
Related searches
Design and Implementation of Digital Health Interventions
by Lisa Danquah , Céire Costelloe- 0.0
Approx. 31 hours to complete
This course covers various themes around design, regulatory approaches, ethics, technology adoption, implementation and strategy as applied to digital health. The strategy part of this course focuses on understanding a simple strategy for digital health through PESTLE and SWOT analysis, and examples of their application in digital health. Developing an implementation strategy...
Microsoft Azure Services and Lifecycles
by Microsoft- 4.8
Approx. 8 hours to complete
With the rise of remote work, bring your own device (BYOD), mobile applications, and cloud applications, the primary security boundary has shifted from firewalls and physical access controls to identity. Build a Cloud Governance Strategy on Microsoft Azure Create a subscription governance strategy...
Covered Calls: Boost Your Cash Flow!
by Scott Unruh- 4.6
1.5 hours on-demand video
Over the long run, investors using this strategy do not see significant increases in their account for long periods of time....
$12.99