Search result for Cybersecurity framework Online Courses & Certifications
Get Course Alerts by Email
Cybersecurity Policy for Water and Electricity Infrastructures
by Richard White- 4.6
Approx. 9 hours to complete
EO13636 also asked Federal agencies with regulating authority to make a recommendation whether the NIST Cybersecurity Framework should be made mandatory. This module will examine both the drinking water and electricity lifeline infrastructure subsectors, and elements and application of the NIST Cybersecurity Framework and ES-C2M2. Module 5: Water Infrastructure & NIST Cybersecurity Framework...
Cybersecurity Job Search and Interviews: Getting Started
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 0.0
Approx. 10 hours to complete
The NIST NICE Cybersecurity Workforce Framework – Major Categories (Lesson 2. The NIST NICE Cybersecurity Workforce Framework – Positions, Knowledge, Skills and Abilities (Lesson 2. The NIST NICE Cybersecurity Workforce Framework – Major Categories (Lesson 2. The NIST NICE Cybersecurity Workforce Framework – Positions, Knowledge, Skills and Abilities (Lesson 2. Education for the Cybersecurity Career (Lesson 4....
Security Governance & Compliance
by Jacob Horne- 4.8
Approx. 9 hours to complete
Topics include the fundamental concepts and goals of cybersecurity (the CIA triad), security governance design, the NIST cybersecurity framework, relevant laws and regulations, and the roles of policies, strategies, and procedures in cybersecurity governance. Introduction to Cybersecurity Goals of Cybersecurity...
Cybersecurity Capstone
by Bo Yuan , Jonathan S. Weissman , Yin Pan- 0.0
8 Weeks
Demonstrate the knowledge and skills acquired in the Cybersecurity MicroMasters Program. The Cybersecurity Capstone is specifically designed to provide a platform for verified learners to practice the hands-on cybersecurity skills and techniques studied in the courses of the RITx Cybersecurity MicroMasters program. digital forensics investigation with tools such as Encase, FTK, and Volatility Framework...
$600
Network Security & Database Vulnerabilities
by IBM Security Learning Services- 4.6
Approx. 14 hours to complete
You will learn the about Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn the network components that guard an organization from cybersecurity attacks. You will learn about various security breach types associated with databases and organizations that define standards and provide tools for cybersecurity professionals. Introduction to the TCP/IP Protocol Framework TCP/IP Framework...
Cybersecurity Risk Management
by Tong Sun- 0.0
8 Weeks
Cybersecurity risk management guides a growing number of IT decisions. Third, we will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security....
$249
Basic Network and Database Security
by Coreen Ryskamp- 0.0
4 Weeks
Build a background needed to understand basic network security and learn how to safeguard your organization from cybersecurity attacks. You will learn about computer networks including Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization and network security controls that guard an organization from cybersecurity attacks....
$149
Related searches
Introduction to Cybersecurity Tools & Cyber Attacks
by IBM Security Learning Services- 4.5
Approx. 20 hours to complete
History of Cybersecurity Introduction to Cybersecurity Tools & Cyber Attacks Welcome to History of Cybersecurity Cybersecurity Definition The Impact of 9/11 on Cybersecurity Describe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices. Identify key cybersecurity tools which include the following: firewall, anti-virus, cryptography, penetration testing and digital forensics....
Cybersecurity Policy for Aviation and Internet Infrastructures
by Richard White- 4.7
Approx. 9 hours to complete
In this course we will examine the aviation and Internet infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. That is to say, they are predicated on a continuous improvement process that engages the whole organization in identifying and implementing incremental changes to enhance cybersecurity practices based on prevailing standards....
Cybersecurity Compliance Framework & System Administration
by IBM Security Learning Services- 4.6
Approx. 16 hours to complete
This course gives you the background needed to understand the key cybersecurity compliance and industry standards. This knowledge will be important for you to learn no matter what cybersecurity role you would like to acquire or have within an organization. What Cybersecurity Challenges do Organizations Face? Overview of US Cybersecurity Federal Law...