Search result for Security management Online Courses & Certifications
Get Course Alerts by Email
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined....
Check Point Jump Start: Network Security
by Check Point Software Technologies- 0.0
Approx. 5 hours to complete
In this course brought to you by industry leader Check Point, they will cover cybersecurity threats and elements of Check Point's Security Management architecture. Deploying Check Point Security Management Deploying Check Point Security Management Deploying Check Point Security Gateways Deploying Check Point Security Gateways Creating a Security Policy Creating a Security Policy...
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. An introduction to knowledge areas in Information Security Security Management Professional bodies in the context of Information Security...
The Business of Cybersecurity Capstone
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Dr. Traci Carte , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Andy Green, Ph.D. , Michael Whitman, Ph.D., CISM, CISSP- 4.9
Approx. 17 hours to complete
This course intends to make the student familiar with information security management. And some common information security management practices such as benchmarking and performance measures. Welcome to the Management of Information Security Welcome to security Management What is security management? Governance and Strategic Planning in Information Security How organizations structure the security function...
Protecting Cloud Architecture with Alibaba Cloud
by Steve Xue- 0.0
Approx. 12 hours to complete
Cloud Platform Security Overview: https://edu. Cyber Security Today Security Risk Evaluation Alibaba Cloud Security Products Overview Security Products Demo Security Center Console Overview Security Overview Linux User Management Linux LVM Management Host Security Security Challenge to Hosts in Cloud Host Security Management 5 Key Points Windows Security Configuration Demo Network Security...
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. Describe the risk management process Perform security assessment activities Understand the Risk Management Process Risk Management Process: Risk Visibility and Reporting Monitoring Results: Security Baseline...
The GRC Approach to Managing Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.8
Approx. 10 hours to complete
This course examines the role of Governance, Risk Management, and Compliance (GRC) as part of the Cybersecurity management process, including key functions of planning, policies, and the administration of technologies to support the protection of critical information assets. Information Security Management Introduction to Key Security Laws US and International Security Laws and Standards...
Related searches
Introduction to Cloud Identity
by Google Cloud Training- 4.6
Approx. 11 hours to complete
Introduction to Cloud Identity serves as the starting place for any new Cloud Identity, Identity/Access Management/Mobile Device Management admins as they begin their journey of managing and establishing security and access management best practices for their organization. • Explore and apply different security protocols to the domain. User Lifecycle Management Introduction to User Lifecycle Management...
Introduction to Enterprise Computing
by Jeff Bisti- 4.7
Approx. 10 hours to complete
Mainframe Security and Start-up z/OS Security Security addendum Transaction level security Crypto Express Key Management z/OS Security Transaction level security Crypto express key management...
Cybersecurity and Its Ten Domains
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.3
Approx. 24 hours to complete
Introduction to Security, Access Control, and Software Development Security Introduction to Security Software Development Security Introduction to Security, Access Control, and Software Development Security Quiz Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Information Security Governance and Risk Management Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Quiz...