Search result for Security policies and procedures Online Courses & Certifications
Get Course Alerts by Email
Create and Lead an Ethical Data-Driven Organization
by Aaron Hui , Abhishek Gupta , Megan Smith Branch- 0.0
Approx. 13 hours to complete
Learners will learn how to develop and implement ethical organizational policies and a code of ethics. They will also be prepared to evaluate the effectiveness of policies with internal and external stakeholders. Create and Lead an Ethical Data-Driven Organization Course Introduction Develop and Deploy Ethical Organizational Policies Policies and Procedures Health Checks of Code of Ethics, Policies, and Procedures...
The GRC Approach to Managing Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.8
Approx. 10 hours to complete
● Identify the key components and methodologies of Cybersecurity policies and policy development System Specific Security Policies Law and Regulation in Cybersecurity US and International Security Laws and Standards Information Security and Law US and International Security Laws and Standards Identify the key components and methodologies of Cybersecurity policies and policy development...
EC-COUNCIL Disaster Recovery Professional Practice Test
by Tony Scheffler- 0.0
EC Council Disaster Recovery Professional (EDRP) is a compressive professional course that teaches students how to develop enterprise-wide business continuity and disaster recovery plans. The professionals will learn how to secure their data by putting policies and procedures in place, and how to recover and restore their organization’s critical data in the aftermath of a disaster....
$12.99
Planning, Auditing and Maintaining Enterprise Systems
by Greg Williams- 4.7
Approx. 12 hours to complete
Organizations also rely on organizational policies, such as Acceptable Use Policies to bolster the technical aspect of system management. The first half of the course covers how to build security into system management process and the organization policies necessary for any enterprise to follow. Policies - Part 1: Organizational Policies Policies - Part 2: Technical Policies...
CompTIA Security+ Certification Exam - Mock Test
by BINKIS DEV- 2.5
Application, data, and host security Achieving CompTIA Security+ certification confirms that you not only can apply knowledge of security concepts, tools, and procedures to react to security incidents, but you also can anticipate security risks and guard against them. Recommended Experience: CompTIA Network+ and two years of experience in IT administration with a security focus...
$12.99
IT Security: Defense against the digital dark arts
by Google Career CertificatesTop Instructor- 4.8
Approx. 30 hours to complete
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. ● how to help others to grasp security concepts and protect themselves. Supplementary reading on HAProxy, nginx and Apache HTTP server Mobile Security and Privacy Supplemental Readings for Mobile Security and Privacy...
The Foundations of Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 9 hours to complete
In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it. The Cybersecurity Personnel and the Security Department (Lecture 1. The Cybersecurity Personnel and the Security Department (Quiz 1....
Related searches
Strategies for Senior Housing Communities during COVID-19
by Juliana Bilowich , Alice Bonner , Molly Nace , Morgan Katz- 4.7
Approx. 10 hours to complete
SARS-CoV-2, the virus that causes COVID-19, poses a high risk for senior housing communities and the people who live and work there. COVID-19 Background, Transmission and Infection Course Resources and Technical Support Assignment Instructions and Goals The 3 P’s of Infection Prevention and Control: Policies, Procedures, and Practice Develop emergency preparedness plans related to COVID-19 policies, practices and procedures...
Palo Alto Networks Cybersecurity Essentials I
by James Dalton- 4.7
Approx. 18 hours to complete
Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Students will also deploy a variety of security methodologies as well as technologies and concepts used for implementing a secure network environment....
Networks and Communications Security
by (ISC)² Education & Training- 4.7
Approx. 20 hours to complete
Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted. Network-Based Security Devices: FIN, NULL, and XMAS Scanning...