Search result for Online Courses & Certifications
Get Course Alerts by Email
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Both technical and non-technical attacks will be discussed. You will learn how an organization can protect itself from these attacks. Objectives...
Check Point Jump Start: Network Security
by Check Point Software Technologies- 0.0
Approx. 5 hours to complete
In this course brought to you by industry leader Check Point, they will cover cybersecurity threats and elements of Check Point's Security Management architecture. This course will prepare you for the exam, #156-412, at PearsonVUE. (https://home. pearsonvue. com/checkpoint) Introduction to the Check Point Solution Introduction to the Check Point Solution Deploying Check Point Security Management...
Cryptography: Boolean functions and related problems
by Kutsenko Aleksandr , Anastasiya Gorodilova , Natalia Tokareva , Stjepan Picek , George Pintus- 4.3
Approx. 5 hours to complete
The course invites you to learn more about cryptography; you'll learn some important math which stands behind the ciphers, and defines how resistant the particular cipher will be to different types of attacks. The key topics covered in the course: * methods of cryptanalysis * AI and ML for cryptography. Welcome to the course, and enjoy your learning!...
Access Controls
by (ISC)² Education & Training- 4.7
Approx. 15 hours to complete
Welcome to Access Controls! The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level or group membership....
IT Security: Defense against the digital dark arts
by Google Career CertificatesTop Instructor- 4.8
Approx. 30 hours to complete
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting....
Information Systems Auditing, Controls and Assurance
by Garvin Percy DIAS- 4.7
Approx. 9 hours to complete
The course is awarded Best Online Courses of the Year (2021 Edition) by Class Central (http://www. classcentral. com). --- Information systems (IS) are important assets to business organizations and are ubiquitous in our daily lives. Management in organizations also need to be assured that systems work the way they expected. IS auditors play a crucial role in handling these issues....
Cybersecurity Roles, Processes & Operating System Security
by IBM Security Learning Services- 4.6
Approx. 15 hours to complete
This course gives you the background needed to understand basic Cybersecurity around people. process and technology. You will learn: ● Understand the key cybersecurity roles within an Organization. ● List key cybersecurity processes and an example of each process. ● Describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux and Mobile....
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk. Once an incident is identified, action will be necessary in order to resolve....
Penetration Testing, Incident Response and Forensics
by IBM Security Learning Services- 4.6
Approx. 17 hours to complete
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will learn about the different phases of penetration testing, how to gather data for your penetration test and popular penetration testing tools. Finally, you will learn key steps in the forensic process and important data to collect....
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined....