Search result for Cybersecurity course Online Courses & Certifications
Get Course Alerts by Email
The GRC Approach to Managing Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.8
Approx. 10 hours to complete
This course examines the role of Governance, Risk Management, and Compliance (GRC) as part of the Cybersecurity management process, including key functions of planning, policies, and the administration of technologies to support the protection of critical information assets. Law and Regulation in Cybersecurity Course Wrap-up on The GRC Approach to Managing Cybersecurity...
Cybersecurity Job Search and Interviews: Getting Started
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 0.0
Approx. 10 hours to complete
This course can help you plan your preparation for such a career as well as give some advice on finding positions and landing a position. • List and explain the knowledge preparation for the cybersecurity professional from an education versus training perspective. Welcome to course on Cybersecurity Job Search and Interviews...
IBM Cybersecurity Analyst Assessment
by IBM Security Learning Services- 4.7
Approx. 4 hours to complete
This is the final course required to assess your acquired knowledge and skills from from the previous two specializations, IT Fundamentals of Cybersecurity and Security Analyst Fundamentals, to become job-ready for a cybersecurity analyst role. You will be expected to pass a final assessment quiz for each of the seven (7) prior courses within the IBM Cybersecurity Analyst Professional Certificate....
The Foundations of Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 9 hours to complete
In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it. The Definition of Cybersecurity Completion Exam for Course The Foundations of Cybersecurity...
Cybersecurity Policy for Water and Electricity Infrastructures
by Richard White- 4.6
Approx. 9 hours to complete
This course will examine the drinking water and electricity infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. In February 2013, President Obama issued Executive 13636 directing the National Institute of Standards and Technology to develop a voluntary set of recommendations for strengthening infrastructure cybersecurity measures....
Managing Network Security
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 15 hours to complete
This course examines the threats associated with using internal and external networks and how to manage the protection of information when it’s accessible via networks. Cybersecurity Technology Administration (Module 3. Cybersecurity Technology Administration Cybersecurity Technology Administration Cybersecurity Technology Administration Cloud networking and cybersecurity Cloud networking and cybersecurity Cybersecurity Network Auditing, Monitoring and Logging (Module 3....
Cybersecurity and Mobility
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.5
Approx. 14 hours to complete
This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. After completing the course modules you will be able to explain how yesterday’s prevention strategies are no longer adequate for stopping advanced, targeted attacks. Next Steps – How to Successfully Complete This Course...
Related searches
Building a Cybersecurity Toolkit
by David Aucsmith- 0.0
6 Weeks
The purpose of this course is to give learners insight into these type of characteristics and skills needed for cybersecurity jobs and to provide a realistic outlook on what they really need to add to their “toolkits” – a set of skills that is constantly evolving, not all technical, but fundamentally rooted in problem-solving....
$199
Managing Cybersecurity Incidents and Disasters
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.8
Approx. 15 hours to complete
This course examines contingency planning used to prepare for and manage non-normal operations, including cybersecurity incidents – like hacking attempts, web site defacement, denial of service attacks, information disclosures; a well as other natural and man-made cybersecurity disasters. ● Define and describe the components of a cybersecurity contingency planning program Course Wrap Up for Managing Cybersecurity Incidents and Disasters...
Security Governance & Compliance
by Jacob Horne- 4.8
Approx. 9 hours to complete
Topics include the fundamental concepts and goals of cybersecurity (the CIA triad), security governance design, the NIST cybersecurity framework, relevant laws and regulations, and the roles of policies, strategies, and procedures in cybersecurity governance. Introduction to Cybersecurity Course Overview Goals of Cybersecurity...