Search result for Information security management specialization Online Courses & Certifications
Get Course Alerts by Email
Security Governance & Compliance
by Jacob Horne- 4.8
Approx. 9 hours to complete
Students are introduced to the field of cyber security with a focus on the domain of security & risk management. Topics include the fundamental concepts and goals of cybersecurity (the CIA triad), security governance design, the NIST cybersecurity framework, relevant laws and regulations, and the roles of policies, strategies, and procedures in cybersecurity governance....
Detect and Mitigate Ethical Risks
by Renée Cummings , Jennifer Fischer , Eleanor 'Nell' Watson- 0.0
Approx. 20 hours to complete
CEET Specialization Introduction Incorporate Fairness and Non-Discrimination Risk Management in the Lifecycle Manage Safety and Security Risks The Importance of Managing Safety and Security Risks Protect the Security of Data in Storage Protect the Security of Data in Transit Security Information and Event Management (SIEM) Incorporate Safety and Security Risk Management in the Lifecycle...
Managing G Suite
by Google Cloud Training- 4.7
Approx. 8 hours to complete
- Understand the mobile device management options available in G Suite. - Explain the basics of multi domain management within G Suite. Introduction to Enhanced Desktop Security for Windows Windows Device Management Enhanced Desktop Security for Windows Deployment Scenarios Exercise #7 - Explore Shared Drive Management Introduction to Mobile Device Management...
Managing Google Workspace
by Google Cloud Training- 4.7
Approx. 8 hours to complete
You will understand the various admin console reports that are available and be able to search and filter the information in these reports. - Explain the basics of multi domain management within Google Workspace. Introduction to Enhanced Desktop Security for Windows Windows Device Management Enhanced Desktop Security for Windows Deployment Scenarios...
Detecting and Mitigating Cyber Threats and Attacks
by Greg Williams- 4.7
Approx. 12 hours to complete
Their information is stolen or posted online. This is the third course in the Practical Computer Security specialization. Splunk and Security...
Introduction to Vulnerability Management
by Corey Charles- 0.0
4 hours on-demand video
Risk Management Fundamentals The course dives into detail information of on the critical issues of vulnerabilities. It covers risk management and covers the basis of penetration testing vs vulnerability management as well. The course also includes lab simulation of vulnerability management processes....
$12.99
Foundations of Computer Science
by Aspen Olmsted- 4.8
Approx. 16 hours to complete
Specialization Introduction Computer Networks, Cloud Computing and Information Security Information Security Information Security Readings Practice Information Security Quiz...
Related searches
IS20 Security Controls
by Integrity Training- 0.0
3 hours on-demand video
IS20 Security Controls The course is equally helpful for the enterprise management staff to effectively gauge the effectiveness of security controls implemented in their organizations. This training course is a comprehensive and essential course for security professionals working with sensitive information and are responsible to ensure its security. Exam Information...
$12.99
Geospatial and Environmental Analysis
by Nick Santos- 4.8
Approx. 14 hours to complete
Through all four weeks of this course, we'll work through a project together - something unique to this course - from project conception, through data retrieval, initial data management and processing, and finally to our analysis products. Take Geospatial and Environmental Analysis as a standalone course or as part of the Geographic Information Systems (GIS) Specialization....
Procurement Basics
by Don Klock- 4.7
Approx. 6 hours to complete
This Course includes basic information on procurement, Importance of the procurement organization and its’ role in the organization, cost vs. value, processes such as the use of RFQ, RFP, RFX, Differences between direct and indirect procurement, and Stakeholder management RFQ Management Process Stakeholder Management Stakeholder Management Best Practices For Successful Stakeholder Management...