Search result for Best practices for cybersecurity Online Courses & Certifications
Get Course Alerts by Email
The GRC Approach to Managing Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.8
Approx. 10 hours to complete
● Describe best practices in risk management including the domains of risk assessment and risk treatment. Cybersecurity Planning for Contingencies (Lesson 2. Wrap up for Law and Regulation in Cybersecurity Wrap up for Law and Regulation in Cybersecurity Describe best practices in risk management including the domains of risk assessment and risk treatment....
Getting Started With Application Development
by Google Cloud Training- 4.5
Approx. 17 hours to complete
Participants learn how to apply best practices for application development and use the appropriate Google Cloud storage services for object storage, relational data, caching, and analytics. Practice Quiz: Best Practices for Application Development Final Quiz: Best Practices for Application Development Best Practices for Using Datastore Practice Quiz: Best Practices for Using Cloud Datastore...
Palo Alto Networks Cybersecurity Gateway II
by James Dalton- 4.7
Approx. 16 hours to complete
Cybersecurity Gateway II • Examine cybersecurity landscape environments, attack threat vectors, exposure, vulnerabilities, and risk factors. Cybersecurity Gateway II Syllabus Gateway II: Module 2 - Cybersecurity Landscape and Threats Video: Cybersecurity Best Practices Part 1 Video: Cybersecurity Best Practices Part 2 Reading: Cybersecurity Landscape and Threats...
The Foundations of Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 9 hours to complete
● Identify the systemic components (including personnel) necessary for an effective cybersecurity program Wrap-up for Introduction to Cybersecurity Quiz for Introduction to Cybersecurity Module for module The Cybersecurity Program Wrap-up for The Foundations of Cybersecurity Completion Exam for Course The Foundations of Cybersecurity Give examples of the systemic components (including personnel) necessary for an effective cybersecurity program...
Cybersecurity Policy for Water and Electricity Infrastructures
by Richard White- 4.6
Approx. 9 hours to complete
In February 2013, President Obama issued Executive 13636 directing the National Institute of Standards and Technology to develop a voluntary set of recommendations for strengthening infrastructure cybersecurity measures. The Environmental Protection Agency who is both the SSA and regulatory authority for the drinking water subsector recommended voluntary application of the NIST Cybersecurity Framework....
Introduction to Cybersecurity Tools & Cyber Attacks
by IBM Security Learning Services- 4.5
Approx. 20 hours to complete
This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the first course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst. Describe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices....
Cybersecurity in Healthcare (Hospitals & Care Centres)
by Jason H. Pridmore , Tessa A. P. Oomen- 4.6
Approx. 15 hours to complete
The Cybersecurity in Healthcare MOOC was developed as part the SecureHospitals. Even if you are not active in the healthcare domain, you will find helpful tips and insights to deal with cybersecurity challenges within any other organisation or in personal contexts as well. Cybersecurity problems for healthcare Cyber hygiene: practices to improve cybersecurity...
Related searches
Cloud Applications
by Umakishore Ramchandran- 0.0
Approx. 4 hours to complete
This course provides an introduction to the development and support for Cloud-native applications, more specifically it delves into best practices of developing applications; migrating on premise applications to the cloud; the basic building blocks and properties expected from Cloud applications. Best Practices for Scalable Cloud App Development Best Practices for Ensuring Reliability and Availability...
Security and Privacy for Big Data - Part 1
by Enrique Barra , Fabian Garcia Pastor- 4.6
Approx. 1 hour to complete
If you are an ICT professional or someone who designs and manages systems in big data environments, this course is for you! Knowledge about Big Data and IT is advantageous, but if you are e. Implementing security for Big Data Administrative measures for Big Data Best practices for securing Big Data Explain security risks and challenges for Big Data system....
CSSLP: Certified Secure Software Lifecycle Professional exam
by Tony Scheffler- 0.0
It shows employers and peers you have the advanced technical skills and knowledge necessary for authentication, authorization and auditing throughout the SDLC using best practices, policies and procedures established by the cybersecurity experts at (ISC)²....
$12.99