Information Security

Sort options

NIST DoD RMF (Coursera)

The Risk Management Framework (RMF) provides a disciplined, structured and flexible process for managing security and privacy risk. It includes information security categorization; control selection, implementation and assessment; system and common control authorizations; and continuous monitoring. It includes activities to prepare organizations to execute the framework at appropriate risk [...]
0
No votes yet

Competencias digitales. Conceptos y herramientas básicas (Coursera)

Los continuos cambios tecnológicos, sobre todo en aquellos aspectos vinculados a las tecnologías de la información y la comunicación (TIC) hacen que las personas tengan la necesidad de actualizarse de forma continua para que sus conocimientos no queden obsoletos. En este contexto, para las empresas se convierte en algo [...]
0
No votes yet

IT Infrastructure and Emerging Trends (Coursera)

Today organizations are either embracing digital technologies to improve their businesses or being disrupted by entrants with such capabilities. Therefore it is important for managers and executives of all organizations to learn about various technologies and apply them in innovative ways. Some of the most important trends in Information [...]
0
No votes yet

Introduction to Cyber Attacks (Coursera)

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks [...]
7
Average: 7 ( 4 votes )

Introduction to Cybersecurity for Business (Coursera)

The world runs computers. From small to large businesses, from the CEO down to level 1 support staff, everyone uses computers. This course is designed to give you a practical perspective on computer security. This course approaches computer security in a way that anyone can understand. [...]
10
Average: 10 ( 3 votes )

Cybersecurity and Its Ten Domains (Coursera)

This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains. They will engage with expertly produced videos, gain [...]
4
Average: 4 ( 4 votes )

Management (Coursera)

Oct 25th 2021
Management (Coursera)
Course Auditing
Categories
Effort
Languages
This course will introduce you to cybersecurity leadership and management. Drawing on industry standards, frameworks and models, you will explore the key objective elements of cybersecurity leadership.
0
No votes yet

Leadership (Coursera)

Oct 25th 2021
Leadership (Coursera)
Course Auditing
Categories
Effort
Languages
This course is an introduction and an overview to the basic principles of cybersecurity leadership and management. It explores and dissects the correlation between security, trust and stability (STS) and the Confidentiality, Integrity and Availability CIA Triad, while integrating information security governance (ISG) and the McKinsey 7S Change [...]
0
No votes yet
Oct 25th 2021
Course Auditing
41.00 EUR

Governance and Strategy (Coursera)

Oct 25th 2021
Governance and Strategy (Coursera)
Course Auditing
Categories
Effort
Languages
This course is an introduction and an overview to the basic principles of cybersecurity Governance and Strategy. It provides guidance on determining information security objectives and how to measure progress toward achieving them. It is an exposition on the rationale and necessity for senior management to integrate information security into [...]
0
No votes yet

Seguridad informática: defensa contra las artes oscuras digitales (Coursera)

Este curso cubre una amplia variedad de conceptos, herramientas y mejores prácticas de seguridad de TI. Introduce amenazas y ataques, y las muchas formas en que pueden aparecer. Te daremos algunos antecedentes de algoritmos de cifrado y cómo se utilizan para salvaguardar los datos. Luego, nos sumergiremos en los [...]
0
No votes yet