Search result for Information systems and management certification Online Courses & Certifications
Get Course Alerts by Email
CISSP - Certified Information Systems Security Professional
by Stone River eLearning- 4.6
7.5 hours on-demand video
CISSP Certification Course - Certified Information Systems Security Professional 2015 The CISSP: Certified Information Systems Security Professional Certification certification training package covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the eight domains of information system security knowledge. The CISSP Certification is administered by the International Information Systems Security Certification Consortium or (ISC)²....
$19.99
Information Systems Auditing, Controls and Assurance
by Garvin Percy DIAS- 4.7
Approx. 9 hours to complete
Information systems (IS) are important assets to business organizations and are ubiquitous in our daily lives. In the course “Information Systems Auditing, Controls and Assurance”, you will explore risks of information systems, and how to mitigate the risks by proper IS Controls. Introduction to Information Systems (IS) Auditing Recent news of risks related to Information Systems...
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. Information and security This video introduces the core information security services and tools provided by cryptography....
CISSP (ALL Domains 1,2,3,4,5,6,7 & 8) Security Professional
by Mukesh Singh- 0.0
7 hours on-demand video
Certified Information Systems Security Professional The CISSP: Certified Information Systems Security Professional Certification certification training package covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the eight domains of information system security knowledge. The CISSP Certification is administered by the International Information Systems Security Certification Consortium or (ISC)²....
$12.99
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined. The Security operations and Administration course addresses basic security concepts and the application of those concepts in the day to day operation and administration of enterprise computer systems and the information that they host....
Introduction to Risk Management
by Qasim Ijaz- 4.7
Approx. 10 hours to complete
In this course, you will learn about risk assessment techniques and how to implement a number of strategies that will ensure the protection of assets. You will learn about the relationship between assets, vulnerabilities, threats, and risks. Risk Management Introduction to Risk Management Risk Management Controls Risk Management Framework Risk Management Assessment...
HI-FIVE: Health Informatics For Innovation, Value & Enrichment (Administrative/IT Perspective)
by Rita Kukafka- 4.7
Approx. 14 hours to complete
Transformative health care delivery programs depend heavily on health information technology to improve and coordinate care, maintain patient registries, support patient engagement, develop and sustain data infrastructure necessary for multi-payer value-based payment, and enable analytical capacities to inform decision making and streamline reporting. Population Health Management and Health IT Population Management and Value-Based Care...
Related searches
Nuclear Knowledge Management
by Куликов Евгений Геннадьевич- 4.9
Approx. 16 hours to complete
Learn why knowledge management is so vital to keeping nuclear power operations running safely and efficiently. Knowledge Management (KM): History and Development Knowledge Management (KM): History and Development Knowledge Management in Nuclear Science and Technology Methods and Tools for Information Management Methods and Tools for Information Management Application of nuclear knowledge management methods and tools in practice...
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. Describe processes for operating and maintaining monitoring systems Risk Management Process: Risk Visibility and Reporting Risk Management Process: Risk Visibility and Reporting Operate and Maintain Monitoring Systems & Analyze and Report Monitoring Results...
Preparing for the Google Cloud Professional Data Engineer Exam
by Google Cloud Training- 4.6
Approx. 9 hours to complete
The purpose of this course is to help those who are qualified develop confidence to attempt the exam, and to help those not yet qualified to develop their own plan for preparation. Understanding the Professional Data Engineer Certification Designing Data Processing Systems Building and Operationalizing Data Processing Systems Designing and Building Data Processing Systems...