Search result for Information security and risk management Online Courses & Certifications
Get Course Alerts by Email
CISM full practice Exams 2020 + Explanations
by Bassam Mostafa- 0.0
In this course, we will prepare you for what it is will be like to take the Certified Information Security Manager (CISM) Exam With a practice exams, we have carefully hand-crafted each question to put you to the test and prepare you to pass the exam with confidence Domain 1: Information Security Governance....
$12.99
CompTIA Security+ Certification Preparation: CyberSecurity
by CyberTraining 365- 0.0
10.5 hours on-demand video
Learn essential principles for network security and risk management. Led by certified instructors, students gain essential knowledge of the principles for network security and risk management with competency in the following: Following similar study formats about Wireless Network Security and Access Control Fundamentals brings us to more practical subjects such as Authentication, Performing Vulnerability Assessments and Conducting Security Audits....
$12.99
Portfolio and Risk Management
by Ramabhadran Thirumalai- 4.5
Approx. 9 hours to complete
This course teaches you the concepts of risk and expected return. We will also look at understanding and interpreting major portfolio management and risk concepts. Expected returns and risk Utility theory and Attitude toward Risk Concept of risk and return Performance Measurement: The What, Why, and How of the Investment Management Process...
Managing G Suite
by Google Cloud Training- 4.7
Approx. 8 hours to complete
This course focuses on the G Suite core services such as Gmail, Calendar, and Drive & Docs. You will understand the various admin console reports that are available and be able to search and filter the information in these reports. - Understand the mobile device management options available in G Suite. Prepare and Deploy Enhanced Desktop Security for Windows...
Managing Google Workspace
by Google Cloud Training- 4.7
Approx. 8 hours to complete
This course focuses on the Google Workspace core services such as Gmail, Calendar, and Drive & Docs. You will understand the various admin console reports that are available and be able to search and filter the information in these reports. - Navigate and interpret Google Workspace admin reports and setup administrator alerts. Prepare and Deploy Enhanced Desktop Security for Windows...
A Guide to Security Information and Event Management - SIEM
by Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!- 3.8
16.5 hours on-demand video
Gain hands-on Tool insights using Splunk on Security information and event management and Security event manager You will gain real time insights on Security information and event management and Security event manager You will learn what SIEM and Log Management mean for businesses & how to use them more effectively to mitigate risk for your company....
$16.99
Introduction to Cybersecurity Tools & Cyber Attacks
by IBM Security Learning Services- 4.5
Approx. 20 hours to complete
You will learn the history of Cybersecurity, types and motives of cyber attacks to further your knowledge of current threats to organizations and individuals. ISSA - Information Systems Security Association FIRST- Forum of Incident Response and Security Teams Welcome to Security Attacks, Actors and their Motive Access Management Frameworks and their purpose...
Related searches
Information Security Foundation Certificate Practice Tests
by Michael Borgers- 0.0
Get an Information Security Certificate for your CV. Pass the Information Security Foundation Exam. These practice tests prepare you for the Information Security Foundation Exam with 300 test questions and detailed explanations. Information and security Threats and risks Approach and organization Security measures Legislation and regulations Information security concepts Risk and Incident Management Hacking… and many more...
$12.99
Real-Time Cyber Threat Detection and Mitigation
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. TCP/IP Evolution and Security Required: “Network Firewalls,” Steve Bellovin and Bill Cheswick...
HI-FIVE: Health Informatics For Innovation, Value & Enrichment (Clinical Perspective)
by Rita Kukafka- 4.6
Approx. 42 hours to complete
The training is role-based and uses case scenarios. Population Health Management and Health IT Value-Based Quality and Safety: Overview Value-Based Quality and Safety: Measurement of Value-Based Care Data Analytics in Clinical Settings: Population Management and Value-Based Care Identifying Risk and Segmenting Populations: Predictive Analytics for Population Health Identifying Risk and Segmenting Populations: Predictive Analytics for Population Health...