Search result for Security policies and procedures Online Courses & Certifications
Get Course Alerts by Email
Cybersecurity Roles, Processes & Operating System Security
by IBM Security Learning Services- 4.6
Approx. 15 hours to complete
process and technology. Welcome to People, Process and Operating System Fundamentals for Cybersecurity Overview of People, Process and Technologies Frameworks and their purpose Roles in Security Welcome to People, Process and Operating System Fundamentals for Cybersecurity Frameworks, Policies and Roles Business Process Management and IT Infrastructure Library Basics Cloud Benefits, Security and Governance...
IBM Data Privacy for Information Architecture
by Christopher Giardina , Aaron Ritchie- 4.7
Approx. 10 hours to complete
Data privacy controls how information is collected, used, shared, and disposed of, in accordance with policies or external laws and regulations. Data governance and organizational structures Data governance and organizational structures introduction Structures and roles Data governance and organizational structures Data Privacy policies and procedures examples The difference between data privacy and security...
WordPress Complete Guide for Experts: Security
by Rodrigo Donini- 3.9
1 hour on-demand video
How to shield your WordPress site like a PRO using great tips to improve your security I will show to you great practices and how can you implement a series of procedures that can definitely increase the security of your WordPress environments....
$11.99
Cybersecurity in Healthcare (Hospitals & Care Centres)
by Jason H. Pridmore , Tessa A. P. Oomen- 4.6
Approx. 15 hours to complete
Even if you are not active in the healthcare domain, you will find helpful tips and insights to deal with cybersecurity challenges within any other organisation or in personal contexts as well. You can also join the Security providers and Trainers platform (see: https://www. Internet security and cyber hygiene Policies and regulations...
CISSP certification practice questions: Domain 1 & 2 - 2021
by Thor Pedersen | 234,000+ Enrollments Worldwide- 4.3
CISSP certification practice questions for CISSP Domain 1 and 2 - Security and Risk Mgmt & Asset Security. CISSP DOMAIN 1: Security and Risk Management (15% of the weighted questions - 160 questions) Security policies, standards, procedures and guidelines Contribute to personnel security policies Integrate security risk considerations into acquisition strategy and practice Establish and manage information security education, training, and awareness...
$14.99
Written Information Security Program for Businesses
by Joshua Johnson- 4
37 mins on-demand video
Develop an Information Security Program Businesses need the proper policies and programs in place to protect data from getting into the wrong hands. This course is a guide to developing and drafting a Written Information Security Program. Lastly, the final exercise is a screen cast explanation of an actual Written Information Security Program....
$12.99
MS-101 Microsoft 365 Mobility and Security Practice Tests
by David Junior- 0.0
You can prepare for the Microsoft MS-101 exam - and demonstrate your true mastery of the skills and knowledge needed to manage mobility, security and administrative tasks related to Microsoft 365. Exam Name: Microsoft 365 Mobility and Security To check Microsoft 365 Mobility and Security (MS-101), open the following topics: Implement or manage the Microsoft 365 patch and security (30-35%)...
$12.99
Related searches
Don't Let Your Customers Run Your Business
by Zanette Phillips- 4.6
2.5 hours on-demand video
Wouldn't you like to streamline your office procedures and save money? Identify the best credit method for a particular business typeIssues to determine whether to give credit and who to give it toSetting up Policies and Procedures The importance of policies and procedures in a businessWhich are the important policies needed to manage the ledger?...
$49.99
Certified Ethical Hacker v10 Test Exam
by Nima Shahmoradi- 4.8
Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures. Reinforce ethical hacking as a unique and self-regulating profession. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure....
$12.99
What is Corruption: Anti-Corruption and Compliance
by Andrew KandelTop Instructor- 4.9
Approx. 12 hours to complete
We’ll also focus on practical strategies for creating compliance policies and procedures that address and prevent corruption. Foreign Corrupt Practices Act, the UK Bribery Act, and many other anti-corruption laws. Much of the course will focus on building out compliance policies and procedures that address corruption. What are the Lessons and What are the Penalties for Corruption? Policies & Procedures...