Search result for Information security course army Online Courses & Certifications
Get Course Alerts by Email
Introduction to Corporate Information Security
by Illumeo Learning- 0.0
39 mins on-demand video
This course explains why information security and its management are important for any modern organization. Information security underpins the commercial viability and profitability of enterprises of all sizes and the effectiveness of public sector organizations. This course explains the basics of information security and why information security and its management are important for any modern organization....
$12.99
IT Security: Defense against the digital dark arts
by Google Career CertificatesTop Instructor- 4.8
Approx. 30 hours to complete
This course covers a wide variety of IT security concepts, tools, and best practices. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team. Wireless Security Creating a Company Culture for Security...
Software Design Threats and Mitigations
by Albert Glock- 4.7
Approx. 19 hours to complete
Open source threat and mitigation information Open source threat and mitigation information Building Security in Security as a build-on, not an add-on Active vs Passive security Active vs Passive security...
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
The Security operations and Administration course addresses basic security concepts and the application of those concepts in the day to day operation and administration of enterprise computer systems and the information that they host. Information security professionals often find themselves in positions of trust and must be beyond reproach in every way. Security Operations and Administration Course Introduction...
Palo Alto Networks Cybersecurity Gateway II
by James Dalton- 4.7
Approx. 16 hours to complete
Gateway II Course Description GATEWAY II: MODULE 1 - COURSE INFORMATION Gateway II Course Information - Textbook and Work Roles Gateway II: Module 3 - Cloud, Virtualization and Storage Security Reading: Cloud, Virtualization and Storage Security...
Foundations of Computer Science
by Aspen Olmsted- 4.8
Approx. 16 hours to complete
In the course sequence you will learn to write programs that utilize both procedural and object oriented techniques to solve business problems. Computer Networks, Cloud Computing and Information Security Information Security Information Security Readings Practice Information Security Quiz...
Security & Safety Challenges in a Globalized World
by Bibi van den Berg , Ruth Prins- 4.8
Approx. 12 hours to complete
The course will introduce you to the broad theme of security and safety in an increasingly complex world. This course combines scholarly inquiry from multiple disciplines (ranging from terrorism studies, to crisis management, to medical science) with real-life cases to explore and understand complex modern-day safety and security challenges. Expert Interview: Chief Information Security Officer...
Related searches
IT Infrastructure and Emerging Trends
by Soumya Sen- 4.9
Approx. 8 hours to complete
Some of the most important trends in Information Technology are in mobile, cloud, security, and blockchains. This course gives you an overview of the fundamental technical aspects of Information Technology. Course Overview Information Security Module 3: Information Security Quiz Course Project Become aware of cyber security threats that organizations need to be aware of and learn about various defense mechanisms....
The Social and Technical Context of Health Informatics
by Harold P. Lehmann, MD, Ph.D.- 4.2
Approx. 9 hours to complete
Physicians, nurses, pharmacists, social workers, and other allied health professionals interested in expanding their understanding of digital health, big data, health information systems, and the unintended consequences of disruptive innovation in the healthcare system. Health Information Technology for Doctors Privacy, Confidentiality, Security Workflow, Information System, Modules Information System Architecture The Modules Comprising Clinical Information Systems Information...
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Describe the processes for operating endpoint device security Operate and Secure Virtual Environments: Network Security Operate and Secure Virtual Environments: Virtual Machine Security...