Search result for Information security course dod Online Courses & Certifications
Get Course Alerts by Email
Healthcare Data Security, Privacy, and Compliance
by Paul Nagy, PhD, FSIIM- 4.7
Approx. 6 hours to complete
In the final course of the Healthcare IT Support program, we will focus on the types of healthcare data that you need to be aware, complexities of security and privacy within healthcare, and issues related to compliance and reporting. Healthcare Data Security and Privacy Protected Health Information Security Breaches in Healthcare...
Information Security Foundation based on ISOIEC 27002 exams
by Jonathan Wade- 0.0
Information Security Foundation is a relevant certification for all professionals who work with confidential information within an IT context. It explains the concept, value, and importance of information security as well as the threats and risks. ***** This course does not content the study material. This course contains 112 questions ********...
$12.99
Information Security Foundation Certificate Practice Tests
by Michael Borgers- 0.0
Get an Information Security Certificate for your CV. Pass the Information Security Foundation Exam. These practice tests prepare you for the Information Security Foundation Exam with 300 test questions and detailed explanations. This course is ideal for professionals studying for or preparing to take an Information Security Test, for example, EXIN Information Security Foundation Exam. Information security concepts...
$12.99
Internet History, Technology, and Security
by Charles Russell Severance- 4.8
Approx. 15 hours to complete
The very fact that you can take this course from anywhere in the world requires a technological infrastructure that was designed, engineered, and built over the past sixty years. This course will open up the Internet and show you how it was created, who created it and how it works. Course Materials...
Introduction to Meteor.js Development
by Dr Matthew Yee-King- 4.6
Approx. 26 hours to complete
You will implement user authentication, security features, reactive templates and routing using iron router. Implement basic security features This course is designed to build on top of the material delivered in the previous two courses in this specialisation. Accessing user information Security and routing Security and routing summary Security and routing summary quiz...
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. Perform security assessment activities Perform Security Assessment Activities Security Assessment Activities: Participate in Security and Test Results Monitoring Results: Security Baseline SSCP Exam Information...
CompTIA Security+ Certification Preparation: CyberSecurity
by CyberTraining 365- 0.0
10.5 hours on-demand video
After a thorough breakdown of what Security and Information are, we discuss Attacks and Defenses as well as Information Security Careers and the Security+ Certification to give students a wealth of background knowledge before diving into Systems Threats and Risks. We finish the course with comprehensive overviews of Cryptography, Business Continuity and, finally, Security Policies and Training....
$12.99
Related searches
Security Management: Excellence in Private Protection
by Alex Goldstein, CPP- 4.3
1 hour on-demand video
The course is about how be a Security Manager of Physical Security Programs, which include protection of people, property, information and reputation. If you are a security supervisor or a lead guard and you aspire to become a manager, or take the next step in your career, this course is for you....
$11.99
Usable Security
by Jennifer Golbeck- 4.6
Approx. 12 hours to complete
This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system....
Managing Network Security
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 15 hours to complete
This course examines the threats associated with using internal and external networks and how to manage the protection of information when it’s accessible via networks. Welcome to the course Managing Network Security (Course 3) Welcome to the course Managing Network Security Wrap up for the course Managing Network Security Managing Network Security Course Examination...