Search result for Information security management Online Courses & Certifications
Get Course Alerts by Email
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. An introduction to knowledge areas in Information Security Professional bodies in the context of Information Security...
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined....
The Business of Cybersecurity Capstone
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Dr. Traci Carte , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Andy Green, Ph.D. , Michael Whitman, Ph.D., CISM, CISSP- 4.9
Approx. 17 hours to complete
This course intends to make the student familiar with information security management. And some common information security management practices such as benchmarking and performance measures. Welcome to the Management of Information Security Governance and Strategic Planning in Information Security Governance and strategic planning in information security practice quiz Governance and strategic planning in information security quiz...
The GRC Approach to Managing Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.8
Approx. 10 hours to complete
This course examines the role of Governance, Risk Management, and Compliance (GRC) as part of the Cybersecurity management process, including key functions of planning, policies, and the administration of technologies to support the protection of critical information assets. Information Security Management Information Security Performance Measurement Introduction to Key Security Laws Information Security and Law...
Cybersecurity and Its Ten Domains
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.3
Approx. 24 hours to complete
Introduction to Security, Access Control, and Software Development Security Introduction to Security Software Development Security Introduction to Security, Access Control, and Software Development Security Quiz Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Information Security Governance and Risk Management Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Quiz...
Proactive Computer Security
by Greg Williams- 4.7
Approx. 11 hours to complete
I’ve heard this before – “I’m not sure my computer security practices are working”. ” This course is the fourth and final course in the Practical Computer Security specialization. Information sharing Week 1: Information Sharing Proactive computer security management University of Colorado Security Program - Required Week 4 - Effective computer security management...
Information Security Management Fundamentals for Non-Techies
by Alton Hardin | 100,000+ Enrollments Worldwide- 4.5
10 hours on-demand video
Learn the Fundamentals of Information Security Management for Non-Techies LEARN INFORMATION SECURITY FUNDAMENTALS FROM ONE OF UDEMY’S TOP IT INSTRUCTORS Are you looking to learn the basics of information security management? "It's really very helpful, it helped me to understand the basics on information security management, surely was above my expectations....
$19.99
Related searches
Enterprise System Management and Security
by Greg Williams- 4.7
Approx. 12 hours to complete
This course is for anyone who is exploring what it might take to have a job as a system administrator or for those who are already specialized in one area of system management and would like to move to another. Good system management starts with knowing security Why information security in the first place? Risk in System Management Information Security...
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. Describe the risk management process Perform security assessment activities Understand the Risk Management Process Risk Management Process: Risk Visibility and Reporting Monitoring Results: Security Baseline SSCP Exam Information...
Cyber Security in Manufacturing
by Shambhu Upadhyaya- 4.7
Approx. 22 hours to complete
Acquire knowledge about security needs and the application of information security systems. Information Security Framework - Part 1 Information Security Framework - Part 2 Application of Information Security - Part 1 Application of Information Security - Part 2 Additional (optional) Resources: Information Security Framework, Part 1 Additional (optional) Resources: Information Security Framework, Part 2...