(ISC)² Education & Training

Sort options

Incident Response, BC, and DR Concepts (Coursera)

May 13th 2024
Incident Response, BC, and DR Concepts (Coursera)
Course Auditing
Categories
Effort
Languages
Welcome to course 2 of 5 of this Specialization, Incident Response, BC, and DR Concepts. This course focuses on the availability part of the CIA triad and the importance of maintaining availability of both human and system resources. These are usually accomplished through the implementation of Incident Response (IR), [...]

Access Control Concepts (Coursera)

May 13th 2024
Access Control Concepts (Coursera)
Course Auditing
Categories
Effort
Languages
Welcome to course 3 of 5 of this Specialization, Access Control Concepts. In Course 1, we introduced access control concepts. Now, we will take a more detailed look at the types of access control that every information security professional should be familiar with. We will discuss both physical and logical controls and how [...]

Security Principles (Coursera)

May 13th 2024
Security Principles (Coursera)
Course Auditing
Categories
Effort
Languages
Welcome to course 1 of 5 of this Specialization, Security Principles. After completing this course, the participant will be able to discuss the foundational concepts of cybersecurity principles: recognize foundational security concepts of information assurance; define risk management terminology and summarize the process; relate risk management to personal or [...]

Network Security (Coursera)

May 13th 2024
Network Security (Coursera)
Course Auditing
Categories
Effort
Languages
Welcome to course 4 of 5 of this Specialization, Network Security. In this course, we will look at computer networking and securing the network. In today’s world, the internet connects nearly everyone and everything, and this is accomplished through networking. While most see computer networking as a positive, criminals [...]

Security Operations (Coursera)

May 13th 2024
Security Operations (Coursera)
Course Auditing
Categories
Effort
Languages
Welcome to course 5 of 5 of this Specialization, Security Operations. This course focuses our attention on the day-to-day, moment-by-moment active use of the security controls and risk mitigation strategies that an organization has in place. We will explore ways to secure the data and the systems they reside [...]

Security Awareness Training (Coursera)

May 13th 2024
Security Awareness Training (Coursera)
Free Course
Categories
Effort
Languages
The security of an organization is of the utmost importance and every member of the organization's staff plays a vital role in defending against cyber threats. One of the best ways to protect the organization is to institute a company-wide security-awareness training initiative.

Risk Management: Use of Access Controls to Protect Assets (Coursera)

Course 2: Understanding Risk Management Options and the Use of Access Controls to Protect Assets. In this course, we will focus on understanding risk management options and the use of access controls to protect assets.

Introducing Security: Aligning Asset and Risk Management (Coursera)

Course 1 - Introducing Security and Aligning Asset Management to Risk Management. In this course, we're going to start by discussing the security concepts, identifying corporate assets, and discussing the risk management process.

Cloud and Wireless Security (Coursera)

Course 6: Cloud and Wireless Security. Welcome to course six. This course applies to security concepts, ideas, and considerations to two major changes that we have experienced in recent years. It's regarding the way we use the data.

Incident Detection and Response (Coursera)

May 6th 2024
Incident Detection and Response (Coursera)
Course Auditing
Categories
Effort
Languages
Course 7: Incident Detection and Response. Welcome to course seven, Incident Detection and Response. Having an intruder inside your systems for months unnoticed by your systems, administrators, security specialists, and end-users is tantamount to giving the intruder, the keys to your business or organization. In many cases, organizations discover [...]