Search result for Information security Online Courses & Certifications
Get Course Alerts by Email
Cloud Security Basics
by Rick Smith- 4.7
Approx. 13 hours to complete
We'll learn and apply classic security techniques to today’s cloud security problems. We’ll analyze recent cloud security vulnerabilities using standard, systematic techniques. We’ll build our own web service case studies and construct security solutions for them. An overview of Cloud Security Basics Internet Service Security Security Controls: Packet Filtering Transport Layer Security...
Penetration Testing - Discovering Vulnerabilities
by Aspen Olmsted- 0.0
5 Weeks
Information Security - Introduction to Information Security Information Security - Authentication and Access Control Information Security - Advanced Topics Network Security - Introduction to Network Security Any information gathered during the Reconnaissance phase is used to inform the attack method during the penetration test Collect interesting information as possible about a target...
$166
Cyber Attack Countermeasures
by Dr. Edward G. Amoroso- 4.8
Approx. 19 hours to complete
This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. Information Flow Models and Hook-Up Theorem - Part 1 Information Flow Models and Hook-Up Theorem - Part 2 Video: “The Security Mirage,” Bruce Schneier, TED Talk Required: “Protection of Information in Computer Systems,” Saltzer and Schroeder...
Cyber Security Economics
by Ross Anderson , Rainer Böhme , Michel van Eeten , Carlos H. Gañán- 0.0
10 Weeks
Learn how to make better decisions about security and IT by using state-of-the-art economic tools, security metrics and data analytics. Economics of information security investment. We discuss available economic tools to better align the incentives for cybersecurity, including better security metrics, cyber insurance/risk transfer, information sharing, and liability assignment. How to design security metrics to capture information security issues...
$50
Managing Network Security
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 15 hours to complete
Almost every organization uses computer networks to share their information and to support their business operations. This course examines the threats associated with using internal and external networks and how to manage the protection of information when it’s accessible via networks. ● Describe the threats to data from information communication technology (ICT) Managing Network Security Cryptography and Network Security...
ISO 27001: Complete MasterCourse for EXIN ISF Certification
by GetGlobal International - USA- 4.5
6.5 hours on-demand video
The EXIN Information Security Management ISO/IEC 27001 online course, teaches how organizations can adopt an internationally recognized and appropriate model for establishing, implementing, operating, monitoring, reviewing and managing an Information Security Management System. ISO 27001 is a holistic model of approach to Security and independent of brands and technology manufacturers....
$12.99
Software Design Threats and Mitigations
by Albert Glock- 4.7
Approx. 19 hours to complete
Open source threat and mitigation information Open source threat and mitigation information Building Security in Security as a build-on, not an add-on Active vs Passive security Active vs Passive security...
SSCP Certification (Systems Security Certified Practitioner
by Packt Publishing- 3.8
5.5 hours on-demand video
It provides confirmation of a practitioner’s ability to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability. • Network and Communications Security A computer and cyber security expert, Sunil Gupta consults in information technology with a focus on cyber security....
$15.99
Enterprise System Management and Security
by Greg Williams- 4.7
Approx. 12 hours to complete
This course may also be for those who are looking to understand how computer security plays an important role in system management. Good system management starts with knowing security Why information security in the first place? Information Security...
ISO/IEC 27701. Privacy Information Management System
by Cristian Vlad Lupa- 0.0
4 hours on-demand video
ISO/IEC 27701 is an extension for privacy of ISO/IEC 27001 (the Information Security Management System standard) and can be used by any organization regardless of its location and size, regardless if it acts as PII (Personally Identifiable Information) controller, PII processor or both. - the third section discusses the information security controls (114) from ISO/IEC 27001 with privacy additions, where they are present....
$14.99