Search result for Security strategy Online Courses & Certifications
Get Course Alerts by Email
Homeland Security & Cybersecurity Connection - It's Not About the Terrorists
by Richard White- 4.7
Approx. 11 hours to complete
Welcome to Course 1 in CS4950, Homeland Security and Cybersecruity. In this course we examine the origins of homeland security and its connection with cybersecurity. Homeland security is about safeguarding the United States from domestic catastrophic destruction. Again, the security implications were profound. Course 1: Homeland Security & Cybersecurity Connection Course 4: Homeland Security & Cybersecurity Future...
Microsoft Azure Architect Design - Mock Test
by BINKIS DEV- 0.0
Optimize Consumption Strategy Design an Auditing and Monitoring Strategy Design for identity and security (20-25%) Design a Monitoring Strategy for Identity and Security Design a Data Management Strategy Design a Data Protection Strategy Design a Monitoring Strategy for the Data Platform Design a business continuity strategy (15-20%) Design a Site Recovery Strategy...
$12.99
Cyber Threat Intelligence
by IBM Security Learning Services- 4.7
Approx. 29 hours to complete
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. • Describe security vulnerability scanning technologies and tools. • Recognize application security threats and common vulnerabilities. Threat Intelligence Strategy and External Sources Security Intelligence What is Data Security and Protection...
Security Governance & Compliance
by Jacob Horne- 4.8
Approx. 9 hours to complete
Students are introduced to the field of cyber security with a focus on the domain of security & risk management. Topics include the fundamental concepts and goals of cybersecurity (the CIA triad), security governance design, the NIST cybersecurity framework, relevant laws and regulations, and the roles of policies, strategies, and procedures in cybersecurity governance....
ISACA CISM Certified Information Security Manager
by Luciano Ferrari- 0.0
8.5 hours on-demand video
One of the highest paid certifications! Become a Certified Information Security Manager! It is a current, comprehensive, peer-reviewed information security management global resource. CISM Domain 1—Information Security GovernanceEstablish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives...
$12.99
Cloud Computing Security
by Patrick Appiah-Kubi , Charif El MaMouni- 0.0
8 Weeks
Learn how to identify security issues in the cloud and industry-standard techniques and procedures to prevent and mitigate risks. Learn how to build a security strategy that keeps data safe and mitigates risk. Evaluate security issues with cloud infrastructure Understand the use of security policies as part of the overall security strategy of an organization...
$299
Palo Alto Networks Academy Cybersecurity Foundation
by James Dalton- 4.7
Approx. 12 hours to complete
Course 1 of 5 in the Palo Alto Networks Security Operating Platform Cybersecurity Specialization. Modern Cyber Attack Strategy Foundation Module 6 - Network Security Models Video: Network Security Models I Video: Network Security Models II Network Security Models Compliance and Security Foundation Module 7 - Cloud and Data Center Security Video: Cloud Security 1...
Related searches
Leadership of Education Technology in Schools
by Hannah Tyreman , Cat Scutt- 0.0
4
How to align a technology strategy with existing school strategies and communicate your vision effectivelyWhat technical and security considerations need to be considered for effective implementation of a technology strategyHow to identify the workload implications of your technology strategyHow to establish and sustain a professional learning culture that can support effective and efficient uses of education technology...
Free
CISM Information Risk Management Practice Exam
by Mind Link Technology- 0.0
Q) database management systems data security responsibility in the organization will include: d) security guarantees in accordance with the strategy. Q) security risk assessment should be repeated periodically, such as: Q) The system administrator does not immediately inform the security officer of a malicious attack. information security manager will be able to prevent this situation:...
$12.99
AZ-400 Designing and Implementing DevOps Certification 2021
by Alan Rodrigues- 4.6
20.5 hours on-demand video
Develop an instrumentation strategy (5-10%) Develop a Site Reliability Engineering (SRE) strategy (5-10%) Develop a security and compliance plan (10-15%) Define and implement a continuous delivery and release management strategy (10-15%) Implementing security in your continuous pipeline...
$19.99