Search result for Security policies Online Courses & Certifications
Get Course Alerts by Email
Securing Windows Server 2016
by Kevin Brown- 4.6
5.5 hours on-demand video
Explore Sysinternals security tools Manage password policies Use Group Policy Preferences to provide enhanced security...
$17.99
ISO/IEC 27701. Privacy Information Management System
by Cristian Vlad Lupa- 0.0
4 hours on-demand video
ISO/IEC 27701 is an extension for privacy of ISO/IEC 27001 (the Information Security Management System standard) and can be used by any organization regardless of its location and size, regardless if it acts as PII (Personally Identifiable Information) controller, PII processor or both. - the third section discusses the information security controls (114) from ISO/IEC 27001 with privacy additions, where they are present....
$14.99
Modern Desktop Certification Exam MD-100: Windows 10
by Integrity Training- 0.0
12 hours on-demand video
Configure devices with policies Manage Windows security...
$19.99
Palo Alto Firewalls Configuration By Example PCNSE Prep
by Infini Tech- 4.4
17 hours on-demand video
Deep dive in Policies and Network Configuration of PaloAlto Firewalls by example - Version 10. Understand DNS security and how to configure DNS sinkhole and DNS security features Understand Palo Alto Firewalls Security Policies Understand security zones and traffic processing in PaloAlto Firewalls...
$15.99
Certified Ethical Hacker v10 Test Exam
by Nima Shahmoradi- 4.8
Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure....
$12.99
300-415 (ENSDWI) Implementing Cisco SD-WAN Solutions : Tests
by Mehul Patel- 2.3
Policies Security...
$12.99
The Power of Markets III: Input Markets and Promoting Efficiency
by Mark Zupan- 4.8
Approx. 8 hours to complete
We will use input market theory to analyze institutions and government policies such as the NCAA sports cartel, the minimum wage, Social Security, and immigration....
Related searches
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. Perform security assessment activities Perform Security Assessment Activities Security Assessment Activities: Participate in Security and Test Results Security Assessment Activities: Potential Problems Monitoring Results: Security Baseline...
Information Security Awareness-ISO 27001:2013
by infySEC Global- 4.5
1 hour on-demand video
Information Security Literate-Cyber security awareness course Hi, welcome to our Information Security Awareness course. This is due to the fact that the employees usually do not understand what information security or business continuity is all about – in other words, you may have perfect policies and procedures, but simply pushing those to your internal email list won’t help....
$16.99
Collateral Securities A Comprehensive Study
by Raja Natarajan, B.Com., PGDBA, FCA- 2.5
1.5 hours on-demand video
In the event of default by the borrower, it is the collateral security which comes to the rescue of bank / financial institution as a fall back support. d) Advances against Life Insurance Policies...
$12.99