Search result for Professional certificate in cybersecurity Online Courses & Certifications
Get Course Alerts by Email
Basic Network and Database Security
by Coreen Ryskamp- 0.0
4 Weeks
Build a background needed to understand basic network security and learn how to safeguard your organization from cybersecurity attacks. This course will give you a basic understanding of network security and sensitive data protection services or as part of the overall Cybersecurity basics professional certificate....
$149
Getting Started with SAS Visual Analytics
by Nicole Ball- 4.7
Approx. 5 hours to complete
In this course, you learn more about SAS Visual Analytics and the SAS Viya platform, how to access and investigate data in SAS Visual Analytics, and how to prepare data for analysis using SAS Data Studio. Professional Certificate Overview Taking Courses in this Professional Certificate Demo: Viewing a Report in Visual Analytics...
Security Governance & Compliance
by Jacob Horne- 4.8
Approx. 9 hours to complete
Topics include the fundamental concepts and goals of cybersecurity (the CIA triad), security governance design, the NIST cybersecurity framework, relevant laws and regulations, and the roles of policies, strategies, and procedures in cybersecurity governance. Introduction to Cybersecurity Goals of Cybersecurity...
Road to the CISO – Culminating Project Course
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 5
Approx. 18 hours to complete
The ultimate destination for a security manager is the Chief Information Security Officer (or Chief Security Officer) a senior executive role responsible for all cybersecurity operations in the organization. dentify the career development and path of a Cybersecurity professional from entry-level to CISO Define and describe the role and function of a CISO in planning for cybersecurity...
Cybersecurity Basics
by Coreen Ryskamp- 0.0
4 Weeks
Finally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era. Describe how penetration testing is used in cybersecurity Explain the role of cryptography in cybersecurity and how it is used. Describe social engineering and how it is used in phishing and vishing attacks....
$149
Building a Cybersecurity Toolkit
by David Aucsmith- 0.0
6 Weeks
This means a successful cybersecurity professional needs to have an expanded arsenal in their toolkit that extends far beyond technical proficiency. Identify what tools and skills are necessary to form today’s Professional Cybersecurity toolkit; Match appropriate tools to different purposes in the cybersecurity management process;...
$199
SOC Analyst (Cybersecurity) Interview Questions and Answers
by Anand Guru- 4.6
3 hours on-demand video
This is not a typical cybersecurity course, trying to teach you concepts, tools or technologies. Whether you are a fresh college graduates or a working professional if you are looking to kick start your career Cybersecurity (especially in the area of Security Operation Center) this series of videos will help you do that....
$24.99
Related searches
Design and Analyze Secure Networked Systems
by Edward Chow- 3.8
Approx. 15 hours to complete
In this MOOC, we will learn the basic cyber security concepts, how to identify vulnerabilities/threat in a network system. We will learn Public Key Infrastructure (PKI) and Linux utility to serve as a CA for an organization, learn how to sign certificate request for clients or servers in secure email and web applications....
Python for Penetration Testers
by Cristi Zot- 4.4
2 hours on-demand video
You're in the right place because this course will teach you how to combine or use Python programming to greatly expand your skills as a cybersecurity professional. This course is the second in a two-course series, that together will develop your Python skills and enable you to apply them in cybersecurity and penetration testing....
$16.99
Palo Alto Networks Cybersecurity Essentials I
by James Dalton- 4.7
Approx. 18 hours to complete
Palo Alto Networks Cybersecurity Essentials I Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Essentials I: Module 2 - Cybersecurity Design Principles Reading: Cybersecurity Design Essentials I: Module 4 - Cryptography, PKI, and Certificate Protection...