Cybersecurity

Sort options

Cybersecurity Risk Management (edX)

Learn key principles of risk analysis, risk assessment and risk mitigation for information security using both qualitative and quantitative methodologies. Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and [...]
2
Average: 2 ( 3 votes )

Cybersecurity Fundamentals (edX)

Learn cybersecurity fundamentals, including how to detect threats, protect systems and networks, and anticipate potential cyber attacks. In this introduction to the field of computing security, you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that [...]
3
Average: 3 ( 3 votes )

Palo Alto Networks Cybersecurity Foundation (Coursera)

In this course, students will learn fundamental principles associated with the current cybersecurity landscape and identify concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Students will also learn how to initially setup and configure security zones, authentication, and policies on [...]
0
No votes yet

Dominant Risk Management Standards and Frameworks (Coursera)

Organizations with little experience in risk management will want to look to national and international organizations for guidance in designing and implementing their risk management efforts. There are two dominant organizations that offer guidance in this area: the U.S. National Institute for Standards in Technology (NIST) and the [...]
0
No votes yet

Securing Linux Systems (Coursera)

Oct 25th 2021
Securing Linux Systems (Coursera)
Course Auditing
Categories
Effort
Languages
In this course, we look at security and the Linux operating system. The course material is a good for anyone preparing for the Linux Foundation Certified IT Associate (LFCA) exam or just interested in learning more about Linux. This course is the third course in a series that aims [...]
0
No votes yet

Management (Coursera)

Oct 25th 2021
Management (Coursera)
Course Auditing
Categories
Effort
Languages
This course will introduce you to cybersecurity leadership and management. Drawing on industry standards, frameworks and models, you will explore the key objective elements of cybersecurity leadership.
0
No votes yet

Leadership (Coursera)

Oct 25th 2021
Leadership (Coursera)
Course Auditing
Categories
Effort
Languages
This course is an introduction and an overview to the basic principles of cybersecurity leadership and management. It explores and dissects the correlation between security, trust and stability (STS) and the Confidentiality, Integrity and Availability CIA Triad, while integrating information security governance (ISG) and the McKinsey 7S Change [...]
0
No votes yet
Oct 25th 2021
Course Auditing
41.00 EUR

Governance and Strategy (Coursera)

Oct 25th 2021
Governance and Strategy (Coursera)
Course Auditing
Categories
Effort
Languages
This course is an introduction and an overview to the basic principles of cybersecurity Governance and Strategy. It provides guidance on determining information security objectives and how to measure progress toward achieving them. It is an exposition on the rationale and necessity for senior management to integrate information security into [...]
0
No votes yet

Seguridad informática: defensa contra las artes oscuras digitales (Coursera)

Este curso cubre una amplia variedad de conceptos, herramientas y mejores prácticas de seguridad de TI. Introduce amenazas y ataques, y las muchas formas en que pueden aparecer. Te daremos algunos antecedentes de algoritmos de cifrado y cómo se utilizan para salvaguardar los datos. Luego, nos sumergiremos en los [...]
0
No votes yet

Segurança de TI: defesa contra as artes negras digitais (Coursera)

Este curso abrange uma grande variedade de conceitos, ferramentas e práticas recomendadas ao nível da segurança de TI. Aborda ameaças e ataques e as várias formas através das quais podem surgir. Vamos fornecer-lhe algumas informações gerais sobre o que são os algoritmos de encriptação e como são utilizados para [...]
0
No votes yet