Search result for Security policies and procedures Online Courses & Certifications
Get Course Alerts by Email
Architecting with Google Kubernetes Engine: Production
by Google Cloud Training- 4.7
Approx. 12 hours to complete
Access Control and Security in Kubernetes and Google Kubernetes Engine (GKE) Kubernetes Control Plane Security Pod Security Applying pod security policies Authentication and authorization Kubernetes control plane security Access Control and Security in Kubernetes and GKE Define Identity and Access Management roles for GKE, as well as Kubernetes pods security policies...
Complete data protection system A-Z in 16 steps (GDPR, CIPM)
by Paweł Mielniczek- 5
5 hours on-demand video
I will cover the necessary steps where you prepare, identify, assess, implement and apply data protection principles at your firm. 16 steps to make sure all data protection measures are in place and function well Assess information security Manage security risks Prepare general policies Identify, assess, implement and maintain compliance with data protection laws Write useful policies, procedures and records...
$12.99
Social Services for Families, Seniors and Those with Disabilities
by John Robertson- 4.9
Approx. 11 hours to complete
Course 4 discusses four populations: families, poor families, people with disabilities, and people as they age. This course addresses issues of power, oppression, and white supremacy. This track will prepare the learner for masters-level work in policy, which involves reading the literature, writing concise summaries and probing critiques. Policies for Families and Children Policies for Poor Families and Children...
Introducing Cisco ASA Firewall Appliacne
by Gopi Venkatesan- 0.0
3.5 hours on-demand video
Cisco ASA Firewall - Security Foundations concepts and skills necessary to configure the Cisco ASA Security Firewall, configure Security Policies, NAT, and learn about managing and monitoring the traffic flow between interfaces with the Help of Security Levels the need of Security Policies security policies to explicitly permit or deny traffic...
$12.99
Information Security Awareness-ISO 27001:2013
by infySEC Global- 4.5
1 hour on-demand video
This is due to the fact that the employees usually do not understand what information security or business continuity is all about – in other words, you may have perfect policies and procedures, but simply pushing those to your internal email list won’t help. It helps each and every employee of an organization on various security policy and its importance....
$16.99
Leaders in Citizen Security and Justice Management for the Caribbean
by Olga Espinoza , Eduardo Pazinato , Alejandra Mera , Hung-En Sung- 0.0
10 Weeks
Learn about the latest in prevention, police and justice modernization, and social rehabilitation. Hence the importance of making this material available to the general public, which allows knowing both the theoretical concepts and what is currently being done in practice in terms of the implementation of citizen security and justice policies in the region....
$25
Principles of Secure Coding
by Matthew Bishop, PhD- 4.4
Approx. 16 hours to complete
It begins by discussing the philosophy and principles of secure programming, and then presenting robust programming and the relationship between it and secure programming. Throughout, methods for improving the security and robustness of your programs will be emphasized and you will have an opportunity to practice these concepts through various lab activities. Security Policies and Procedures...
Related searches
Check Point Jump Start: SMB Network Security
by Check Point Software Technologies- 0.0
Approx. 2 hours to complete
This course introduces you to Check Point's Small and Medium Business (SMB) network security appliances. You will learn how to deploy, configure, manage, and monitor network security policy on the SMB appliance platform. Upon completion of this course, you will be prepared to deploy, configure, and administrate a Check Point Small/Medium Business Network Security appliance....
Security Best Practices in Google Cloud
by Google Cloud Training- 4.6
Approx. 13 hours to complete
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs....
Managing G Suite
by Google Cloud Training- 4.7
Approx. 8 hours to complete
This course focuses on the G Suite core services such as Gmail, Calendar, and Drive & Docs. - Describe Google Vault and learn how to use it to retain, search and export your organization's data. - Navigate and interpret G Suite admin reports and setup administrator alerts. Prepare and Deploy Enhanced Desktop Security for Windows...