Search result for Information security and risk management Online Courses & Certifications
Get Course Alerts by Email
FinTech Risk Management
by Garvin Percy DIAS , Theodore Henry King CLARK- 4.6
Approx. 15 hours to complete
This course “FinTech Risk Management” help you understand risk management and corporate governance in finance industry with the disruption by FinTech and RegTech. 6 Compliance regarding Crypto and ICOs 3 FinTech Operational Risk Examples 6 Risk Management & Fraud Avoidance 7 Introduction to Risk Analysis 8 Risk Management Process I 9 Risk Management Process II...
Privacy Law and HIPAA
by Lauren SteinfeldTop Instructor- 4.4
Approx. 12 hours to complete
We’ll explore the notion that one cannot have privacy without strong security and examine various models that promote the security of personal information. We’ll look closely at breach notification laws – one of the most significant drivers of change in organizations – and discuss strategies for the improvement of data protection overall. Compliance Observations in Information Security...
Nuclear Knowledge Management
by Куликов Евгений Геннадьевич- 4.9
Approx. 16 hours to complete
Learn why knowledge management is so vital to keeping nuclear power operations running safely and efficiently. Knowledge Management (KM): History and Development Knowledge Management (KM): History and Development Knowledge Management in Nuclear Science and Technology Methods and Tools for Information Management Methods and Tools for Information Management Application of nuclear knowledge management methods and tools in practice...
ISO/IEC 27001. Information Security Management System.
by Cristian Lupa- 4.4
5 hours on-demand video
Context of the organization, leadership, information security policy and objectives, information security risk assessment and treatment, competence and awareness, documented information, operational planning and control, internal audit, management review, nonconformity and corrective action along with all the other requirements of the standard are discussed. - work in a company that implemented an information security management system or...
$14.99
Information Security Management Fundamentals for Non-Techies
by Alton Hardin | 100,000+ Enrollments Worldwide- 4.5
10 hours on-demand video
Learn the Fundamentals of Information Security Management for Non-Techies LEARN INFORMATION SECURITY FUNDAMENTALS FROM ONE OF UDEMY’S TOP IT INSTRUCTORS Are you looking to learn the basics of information security management? Once you complete this course, you'll understand the core principles of information security to help you better protect your IT and business infrastructure!...
$19.99
Software Design Threats and Mitigations
by Albert Glock- 4.7
Approx. 19 hours to complete
Common Vulnerabilities and Weaknesses Introduction to Threats and Mitigations Open source threat and mitigation information Open source threat and mitigation information Building Security in Security as a build-on, not an add-on Active vs Passive security Active vs Passive security Software Life Cycle and Management considerations Software Life Cycle and Management considerations...
Privacy Law and Data Protection
by Lauren SteinfeldTop Instructor- 4.8
Approx. 12 hours to complete
We’ll explore the notion that one cannot have privacy without strong security and examine various models that promote the security of personal information. We’ll look closely at breach notification laws – one of the most significant drivers of change in organizations – and discuss strategies for the improvement of data protection overall. Compliance Observations in Information Security...
Related searches
Homeland Security and Cybersecurity Future
by Richard White- 4.6
Approx. 11 hours to complete
In this respect, we take a short survey of potential technological solutions and response options. We conclude this module by taking a look at unique aspects of the cyber profession and personal considerations for those who want to make cybersecurity a career. Module 13: Assessing Risk & Future Options Cyber Risk & Crisis Management (Optional Video)...
IT Security: Defense against the digital dark arts
by Google Career CertificatesTop Instructor- 4.8
Approx. 30 hours to complete
This course covers a wide variety of IT security concepts, tools, and best practices. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. ● how to help others to grasp security concepts and protect themselves. Measuring and Assessing Risk Mobile Security and Privacy Supplemental Readings for Mobile Security and Privacy Information and FAQs about badges...
Investment Strategies and Portfolio Analysis
by Arzu Ozoguz- 4.1
Approx. 15 hours to complete
In this course, you will learn about latest investment strategies and performance evaluation. Introduction and Welcome to class Basic measures of risk Tracking error and residual risk Appraisal ratio and information ratio Accompanying spreadsheet for "Appraisal ratio and information ratio" The Sharpe ratio and the information ratio Asset allocation: Management style and performance measurement...