Search result for Information security and risk management Online Courses & Certifications
Get Course Alerts by Email
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. Information and security This video introduces the core information security services and tools provided by cryptography....
The Business of Cybersecurity Capstone
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Dr. Traci Carte , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Andy Green, Ph.D. , Michael Whitman, Ph.D., CISM, CISSP- 4.9
Approx. 17 hours to complete
• You will understand the various types of InfoSec policies and how effective information security policy is created and used. And some common information security management practices such as benchmarking and performance measures. Governance and Strategic Planning in Information Security Governance and strategic planning in information security practice quiz Governance and strategic planning in information security quiz...
The GRC Approach to Managing Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.8
Approx. 10 hours to complete
This course examines the role of Governance, Risk Management, and Compliance (GRC) as part of the Cybersecurity management process, including key functions of planning, policies, and the administration of technologies to support the protection of critical information assets. Information Security and Law Describe best practices in risk management including the domains of risk assessment and risk treatment....
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. Describe the risk management process Understand the Risk Management Process Risk Management Process: Risk Visibility and Reporting Risk Management Process: Risk Visibility and Reporting...
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined....
Cybersecurity and Its Ten Domains
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.3
Approx. 24 hours to complete
Introduction to Security, Access Control, and Software Development Security Introduction to Security, Access Control, and Software Development Security Quiz Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Information Security Governance and Risk Management Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Quiz Operations Security & Physical and Environmental Security...
Introduction to Risk Management
by Qasim Ijaz- 4.7
Approx. 10 hours to complete
In this course, you will learn about risk assessment techniques and how to implement a number of strategies that will ensure the protection of assets. You will learn about the relationship between assets, vulnerabilities, threats, and risks. Risk Management Introduction to Risk Management Risk Management Controls Risk Management Framework Risk Management Assessment...
Related searches
Disaster Risk Management and Korean Policies
by Sohn, Hong-Gyoo- 4.6
Approx. 19 hours to complete
Throught this, students will be able to explain not only what is disaster risk management but also what must be done for a disaster resilent future. Disaster Risk Management Disaster Risk Management Disaster Risk Management Science and Technology for Disaster Risk Management Science and Technology for Disaster Risk Reduction Enhancing Comprehensiveness, Professionalism, Risk Analysis and Governance...
Software Requirements Prioritization: Risk Analysis
by Kristen Walcott-Justice- 4.6
Approx. 18 hours to complete
Risk Analysis, Assessment, and Prioritization looks at how you can manage conflicts at system levels, but it can also be applied to lower level assessments. Bringing Security into Risk Analysis Risk and Cut-Set Trees Risk Control and Countermeasures Software risk management: principles and practices Risk Assessment | Risk Control and Countermeasures - Slides...
Enterprise System Management and Security
by Greg Williams- 4.7
Approx. 12 hours to complete
This course is for anyone who is exploring what it might take to have a job as a system administrator or for those who are already specialized in one area of system management and would like to move to another. Good system management starts with knowing security Why information security in the first place? Risk in System Management Information Security...