Search result for Information systems Online Courses & Certifications
Get Course Alerts by Email
Certified Information Security Manager (CISM)
by Integrity Training- 4.3
21.5 hours on-demand video
Certified Information Security Manager (CISM) The Certified Information Security Manager (CISM) course helps the candidates to achieve the CISM certification. The certification is offered by the Information Systems Audit and Control Association (ISACA) to validate the expertise and knowledge of the candidates regarding the relationship between an information security program and the broader business targets....
$25.99
Anatomy: Human Neuroanatomy
by Kelli Sullivan- 4.9
Approx. 17 hours to complete
Motor Systems Direct Labelling Quiz - Motor Systems Direct Motor Systems Basal Ganglia Labelling Quiz - Motor Systems Basal Ganglia Motor Systems Cerebellum Sensory Systems Introduction to Sensory Systems Sensory Systems Intro Sensory Systems Gross Touch Labelling Quiz - Sensory Systems Gross Touch Sensory Systems Fine Touch Cranial Nerves Carrying Parasympathetic Information...
How to a make and market a Digital product, fast.
by Martin Armstrong- 0.0
1.5 hours on-demand video
If your a business owner or an aspiring entrepreneur and your terrible at getting clients, your about to learn, a full prof process you can use to create a great information product and get new customers in the door. Information businesses are systems of information, and as you know systems are the key to business success....
$12.99
Penetration Testing - Exploitation
by Aspen Olmsted- 0.0
5 Weeks
Information Security - Introduction to Information Security Exploits are developed to, for example, gather sensitive information or to enable the ethical hacker to compromise a system and manifest themselves on it. For any new targets, the reconnaissance and enumeration phases are re-entered, to gather information about these new systems and exploit them....
$166
Computer and Network Hacking Mastery: Practical Techniques
by Hacking School- 0.0
4 hours on-demand video
Anyone who’s interested in ethical hacking or security systems can benefit from this welcoming hacking community and in-depth course. Intercept Information in a Network with SSL Encryption...
$12.99
Learn Ethical Hacking From Scratch
by Ashwin Pk- 0.0
4.5 hours on-demand video
Become an ethical hacker that can hack computer systems like black hat hackers and secure them like security experts. Server Side Attacks: In this approach you will learn how to gain full access to computer systems without the need for user interaction. Anybody who wants to learn how hackers hack computer systems...
$12.99
IT Governance
by The Art Of Service- 0.0
2.5 hours on-demand video
An introductory course about understanding the governance of information technology. Get a head start and explore the concepts surrounding Information Technology Governance tools and techniques. IT Governance is a subset discipline of Corporate Governance focused on Information Technology (IT) systems, their performance, and risk management....
$14.99
Related searches
System Validation (3): Requirements by modal formulas
by Jan Friso Groote- 0.0
Approx. 4 hours to complete
System Validation is the field that studies the fundamentals of system communication and information processing. We want to guarantee that the systems does exactly what it is supposed to do. This means that the systems are not only behaving correctly, but are also much easier to maintain and adapt....
IoT Networking and Fog Layer Devices
by Krzysztof Tokarz , Piotr Czekalski- 0.0
4 Weeks
General information about Bluetooth Scatternet and Bluetooth Mesh (5. Information about hardware and operating systems for Raspberry Pi platform. This includes basic information on OS installation and development environment configuration. This includes basic information on OS installation and development environment configuration....
$149
Cybersecurity Compliance and System Administration
by Coreen Ryskamp- 0.0
4 Weeks
You will also learn about how to secure your systems through an understanding of basic server administration concepts. Data protection regulations concerning personal data including phone number, credit card information and other sensitive data for healthcare and credit cards are reviewed. Both of these topics are important to keep systems current to avoid cybersecurity risks against an organization....
$149