Search result for Security policies Online Courses & Certifications
Get Course Alerts by Email
CISSP Certification: CISSP Domain 1 & 2 Boot Camp UPDATED 21
by Thor Pedersen | 240,000+ Enrollments Worldwide- 4.6
6 hours on-demand video
Information Security Governance: Values, vision, mission, and plans. Information Security Governance: Policies, procedures, guidelines, and frameworks. Data security frameworks Prepare for the 2021 version of the Certified Information Systems Security Professional (CISSP) Certification Exam, which is what you will be tested on until the next CISSP curriculum update in 2024....
$17.99
TOTAL: CompTIA A+ Certification (220-1002) Practice Tests.
by Total Seminars • 750,000+ Enrollments- 4.2
Security - 24% Physical security (locks, badge readers, guards, etc) Logical security concepts (Active Directory, antivirus/anti-malware, firewalls, certificates, etc) Wireless security protocols (WPA, WPA2, RADIUS, etc) Different types of licenses and policies...
$18.99
Sustainable Food Security: Food Access
by Marrit van den Berg , Hilde Bras , Jeroen Candel , Jessica Duncan- 0.0
6 Weeks
Food access: Learn about food supply and food security Is influenced on a national scale by politics and policies by negotiating and aligning goals, instruments, and modes of governance ¥ is impacted by debates and negotiations creating conditions in food trade by international organizations...
$49
Node Js: API Development with Sails Js Build REST API
by Akshay Bhardwaj- 4.1
2 hours on-demand video
Reusable security Policies...
$12.99
IBM Data Privacy for Information Architecture
by Christopher Giardina , Aaron Ritchie- 4.7
Approx. 10 hours to complete
Data privacy controls how information is collected, used, shared, and disposed of, in accordance with policies or external laws and regulations. Data Privacy policies and procedures examples Data privacy vs security Data privacy vs security introduction The difference between data privacy and security Security mechanisms Data privacy vs security...
Azure Architect Technologies: AZ-303
by Kevin Brown- 4.6
15.5 hours on-demand video
You will learn about basic virtual networking concepts like virtual networks and subnetting, IP addressing, network security groups, Azure Firewall, and Azure DNS. Implement Load Balancing and Network Security Implement Network Security Groups and Application Security Group Configure Network Security Groups (NSGs) Storage Security Azure Infrastructure Security Monitoring Manage Security for Applications...
$16.99
Network Security - Advanced Topics
by Aspen Olmsted- 0.0
5 Weeks
Learn advanced topics in network security, including Security Monitoring, Perimeter Security, IPv6 and IPv6 Security. This is a self-paced course that provides a continuation of network security topics. Among the topics covered are Security Monitoring, Perimeter Security, IPv6, and IPv6 Security. Define network security monitoring Summarize the policies used in network security monitoring...
$166
Related searches
Hybrid Cloud Service Mesh with Anthos
by Google Cloud Training- 4.8
Approx. 8 hours to complete
Intro to Security in the Service Mesh Service to Service Security with Mutual TLS in the Service Mesh Managing Policies and Security with Service Mesh Use service mesh security features for service-service authentication, user authentication, and policy-based service authorization....
Global Energy and Climate Policy
by Harald Heubaum- 4.6
Approx. 13 hours to complete
The Global Energy and Climate Policy course offers an introduction to the theoretical and practical understanding of how energy and climate change policies are designed, shaped, advocated and implemented. As energy markets go truly global, domestic energy policies are becoming more and more entangled with wider issues of international governance. Energy Security 1...
Detect and Mitigate Ethical Risks
by Renée Cummings , Jennifer Fischer , Eleanor 'Nell' Watson- 0.0
Approx. 20 hours to complete
Data Protection Policies Manage Safety and Security Risks The Importance of Managing Safety and Security Risks Protect the Security of Data in Storage Protect the Security of Data in Transit Security Information and Event Management (SIEM) Incorporate Safety and Security Risk Management in the Lifecycle Managing Safety and Security Risks Quiz...