Search result for Security risks Online Courses & Certifications
Get Course Alerts by Email
Cloud Application Security
by Rick Smith- 0.0
Approx. 6 hours to complete
● Identify methods to provide cloud security assurance as part of the development life cycle, e. Application Security Risks Introduction to Cloud Application Security Top Ten Cloud Security Risks OWASP Risks #2, #3, #4 OWASP Risks #5, #6, #7 OWASP Risks #8, #9, #10 Welcome to Cloud Application Security (place holder)...
Detect and Mitigate Ethical Risks
by Renée Cummings , Jennifer Fischer , Eleanor 'Nell' Watson- 0.0
Approx. 20 hours to complete
Detect and Mitigate Ethical Risks Course Introduction The Importance of Managing Risks The Importance of Managing Fairness and Non-Discrimination Risks Managing Fairness and Non-Discrimination Risks Manage Safety and Security Risks The Importance of Managing Safety and Security Risks Protect the Security of Data in Storage Managing Safety and Security Risks Quiz...
Cybersecurity Risk Management
by Tong Sun- 0.0
8 Weeks
In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Information security risk management framework and methodologies Identifying and modeling information security risks Articulating information security risks as business consequences...
$249
Cybersecurity and Privacy in the IoT
by Iain Murray AM , Nazanin Mohammadi , Eleanor Sandry , Siavash Khaksar- 0.0
5 Weeks
Learn about the security and privacy implications of the IoT and how to design a secure system. As a professional working in the field, it is essential to understand the potential security risks and how to best mitigate them. Identify and analyse IoT security and privacy risks...
$199
Oracle Cloud Security Data Protection and Encryption
by Zulqarnain Hayat- 3.5
4.5 hours on-demand video
With the increasing risks of cyberattacks, database hacks, and data leaks, knowing how to fully enable and leverage all of the Oracle 12c security features is essential. Learn how to identify the major risks and security threats, and review general best practices for properly protecting and "hardening" any production database. Core concepts of Oracle database security...
$11.99
Cyber Threat Intelligence
by IBM Security Learning Services- 4.7
Approx. 29 hours to complete
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will understand data protection risks and explore mobile endpoint protection. • Describe security vulnerability scanning technologies and tools. • Recognize application security threats and common vulnerabilities. Application Security Techniques and Risks Knowledge Check...
Risk in Modern Society
by Marieke Liem , Bibi van den Berg , Edwin Bakker , Jim van Steenbergen , Sabine Roeser , Margreet Vos , Genserik Reniers , Pieter van Gelder- 4.7
Approx. 11 hours to complete
In five distinctive weeks, this course closely examines various types of safety and security risks, and how these are perceived and dealt with in a wide array of professional and academic fields, ranging from criminology, counter-terrorism and cyber security, to philosophy, safety and medical science. 2 The Study of Risk: Security Studies Risks in the Chemical Industry...
Related searches
G Suite Security
by Google Cloud Training- 4.7
Approx. 6 hours to complete
G Suite Security is the third course in the G Suite Administration series. Finally you will understand how to spot potential security risks within your organization and learn how to address them using the tools available in the admin console. G Suite Security Introduction to Common Security Settings Exercise #1 - Configure Common Security Settings...
Google Workspace Security
by Google Cloud Training- 4.7
Approx. 6 hours to complete
Google Workspace Security is the third course in the Google Workspace Administration series. Finally you will understand how to spot potential security risks within your organization and learn how to address them using the tools available in the admin console. G Suite Security Introduction to Common Security Settings Exercise #1 - Configure Common Security Settings...
Securing Digital Democracy
by J. Alex Halderman- 4.8
Approx. 14 hours to complete
In this course, you'll learn what every citizen should know about the security risks--and future potential — of electronic voting and Internet voting. Voting as a Security Problem The Security Mindset Security Requirements for Voting Voting as a Security Problem Security Procedures and Voting Around the World Security Procedures and Voting Around the World...