Search result for Information security management specialization Online Courses & Certifications
Get Course Alerts by Email
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. An introduction to knowledge areas in Information Security Professional bodies in the context of Information Security...
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined....
The Business of Cybersecurity Capstone
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Dr. Traci Carte , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Andy Green, Ph.D. , Michael Whitman, Ph.D., CISM, CISSP- 4.9
Approx. 17 hours to complete
This course intends to make the student familiar with information security management. And some common information security management practices such as benchmarking and performance measures. Welcome to the Management of Information Security Governance and Strategic Planning in Information Security Governance and strategic planning in information security practice quiz Governance and strategic planning in information security quiz...
The GRC Approach to Managing Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.8
Approx. 10 hours to complete
This course examines the role of Governance, Risk Management, and Compliance (GRC) as part of the Cybersecurity management process, including key functions of planning, policies, and the administration of technologies to support the protection of critical information assets. Information Security Management Information Security Performance Measurement Introduction to Key Security Laws Information Security and Law...
Cybersecurity and Its Ten Domains
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.3
Approx. 24 hours to complete
Introduction to Security, Access Control, and Software Development Security Introduction to Security Software Development Security Introduction to Security, Access Control, and Software Development Security Quiz Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Information Security Governance and Risk Management Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Quiz...
Introduction to Database Management Systems (DBMS)
by Edoreal Learning Solutions- 3.8
1 hour on-demand video
Learn Fundamental Concepts of Database Management from scratch Information is not useful if not organized. Database Management System (DBMS) is used to input, sort, organize and store data. Transaction Management Data Mining & Information Retrieval Constraints on Specialization & Generalization Specialization & Generalization Hierarchies & Lattices...
$11.99
Proactive Computer Security
by Greg Williams- 4.7
Approx. 11 hours to complete
I’ve heard this before – “I’m not sure my computer security practices are working”. ” This course is the fourth and final course in the Practical Computer Security specialization. Information sharing Week 1: Information Sharing Proactive computer security management University of Colorado Security Program - Required Week 4 - Effective computer security management...
Related searches
Information Security Management Fundamentals for Non-Techies
by Alton Hardin | 100,000+ Enrollments Worldwide- 4.5
10 hours on-demand video
Learn the Fundamentals of Information Security Management for Non-Techies LEARN INFORMATION SECURITY FUNDAMENTALS FROM ONE OF UDEMY’S TOP IT INSTRUCTORS Are you looking to learn the basics of information security management? "It's really very helpful, it helped me to understand the basics on information security management, surely was above my expectations....
$19.99
Enterprise System Management and Security
by Greg Williams- 4.7
Approx. 12 hours to complete
This course is for anyone who is exploring what it might take to have a job as a system administrator or for those who are already specialized in one area of system management and would like to move to another. Good system management starts with knowing security Why information security in the first place? Risk in System Management Information Security...
Cryptography and Information Theory
by Sang-Yoon Chang- 4.5
Approx. 8 hours to complete
Welcome to Cryptography and Information Theory! This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer). Security by Obscurity and Steganography, Part 1 Security by Obscurity and Steganography, Part 2 Kerckhoff's Principle and Security by Obscurity Information Entropy Information Entropy...