Search result for Cybersecurity policy Online Courses & Certifications
Get Course Alerts by Email
The GRC Approach to Managing Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.8
Approx. 10 hours to complete
● Identify the key components and methodologies of Cybersecurity policies and policy development Cybersecurity Policy (Module 2. Cybersecurity Policy Enterprise Cybersecurity Policy Developing and Implementing Effective Cybersecurity Policy Cybersecurity Policy Enterprise Cybersecurity Policy Developing and Implementing Effective Cybersecurity Policy Identify the key components and methodologies of Cybersecurity policies and policy development...
Penetration Testing, Incident Response and Forensics
by IBM Security Learning Services- 4.6
Approx. 17 hours to complete
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. Furthermore, you will learn the phases of an incident response, important documentation to collect, and the components of an incident response policy and team. Coding in cybersecurity...
Cybersecurity Law & Policy
by Victoria Sutton- 4.1
2 hours on-demand video
Domestic and International Cybersecurity Law Cybersecurity Law is one This course is about now and the future of cybersecurity law. When you have finished this course, you will have been introduced to the skill of spotting important cybersecurity legal issues and presented with the basic knowledge to know when you need to consult with an...
$9.99
Cybersecurity: The CISO's View
by Barbara Endicott-Popovsky- 0.0
6 Weeks
Learn about cybersecurity operations and the role played by the Chief Information Security Officer (CISO) in the industry. This course delves into the role that the CISO plays in cybersecurity operations. Throughout the lessons, learners will explore answers to the following questions: How does cybersecurity work across industries? Identify cybersecurity specific tools for their appropriate domains and situations....
$199
Homeland Security & Cybersecurity Connection - It's Not About the Terrorists
by Richard White- 4.7
Approx. 11 hours to complete
Following 9/11, critical infrastructure protection and cybersecurity were designated core missions in the 2002 Homeland Security Act establishing the new Department of Homeland Security. Course 1: Homeland Security & Cybersecurity Connection Course 2: Cybersecurity Policy for Water and Electricity Infrastructures Course 3: Cybersecurity Policy for Aviation and Internet Infrastructures Course 4: Homeland Security & Cybersecurity Future...
Digitalization in International Relations
by Yarygin Grigory , Sytnik Anna , Tsvetkova Natalia , Stadnik Ilona- 4.5
Approx. 16 hours to complete
International relations, diplomacy, and foreign policy are being digitalized. Big data and data diplomacy refer to various methods used to analyze social networks and embrace artificial intelligence in order to cope with foreign policy issues including the challenges of information confrontation. Cybersecurity and Information Security Multilateral, Regional Cybersecurity Initiatives Private Sector Cybersecurity Initiatives...
Information Security - Introduction to Information Security
by Aspen Olmsted , Justin Cappos- 0.0
5 Weeks
This is the 1st course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We conclude by taking an in-depth look at different security policy models, including the Bell-La Padula (BLP) Model, the Biba Integrity Model, Lipner's Model, and Clark-Wilson Integrity Model. Next, we consider the practical aspects of the implementation of the policy models....
$166
Related searches
Cyber Security Economics
by Ross Anderson , Rainer Böhme , Michel van Eeten , Carlos H. Gañán- 0.0
10 Weeks
This economics course provides an introduction to the field of cybersecurity through the lens of economic principles. We discuss market failures that may lead to cybersecurity investment levels that are insufficient from society’s perspective and other forms of unsafe behaviour in cyber space. Behavioural economics for information security, policy and regulation....
$50
Road to the CISO – Culminating Project Course
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 5
Approx. 18 hours to complete
The ultimate destination for a security manager is the Chief Information Security Officer (or Chief Security Officer) a senior executive role responsible for all cybersecurity operations in the organization. dentify the career development and path of a Cybersecurity professional from entry-level to CISO Define and describe the role and function of a CISO in planning for cybersecurity...
Cybersecurity Policy for Water and Electricity Infrastructures
by Richard White- 4.6
Approx. 9 hours to complete
This course will examine the drinking water and electricity infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. In February 2013, President Obama issued Executive 13636 directing the National Institute of Standards and Technology to develop a voluntary set of recommendations for strengthening infrastructure cybersecurity measures....