Security

Sort options

Foundations of Cybersecurity (Coursera)

May 6th 2024
Foundations of Cybersecurity (Coursera)
Course Auditing
Categories
Effort
Languages
This is the first course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to prepare for an entry-level cybersecurity job. In this course, you will be introduced to the world of cybersecurity through an interactive curriculum developed by Google. You will identify [...]

Put It to Work: Prepare for Cybersecurity Jobs (Coursera)

May 6th 2024
Put It to Work: Prepare for Cybersecurity Jobs (Coursera)
Course Auditing
Categories
Effort
Languages
This is the eighth and final course in the Google Cybersecurity Certificate. Together, these eight courses will equip you with the skills you need to apply for an entry-level cybersecurity job. In this course, you will focus on making decisions and escalating incidents to stakeholders. You'll develop the communication [...]

Play It Safe: Manage Security Risks (Coursera)

May 6th 2024
Play It Safe: Manage Security Risks (Coursera)
Course Auditing
Categories
Effort
Languages
This is the second course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the first Google Cybersecurity Certificate course.

Check Point Jump Start: Harmony Mobile (Coursera)

Harmony Mobile is the first mobile threat solution among the industry's top leading vendors to prevent the download of malicious files to mobile devices. With a staggering rise in mobile-related attacks, Check Point Harmony Mobile customers can rest assured knowing that their critical business assets remain protected from even [...]

Cloud Computing Law: Data Protection and Cybersecurity (Coursera)

Vast amounts of personal information are processed in the cloud. But who is legally responsible for such ‘personal data’ in cloud environments? What duties do cloud providers like Amazon, Microsoft, and Google have? And what rights can you, as an individual, exercise under data protection law? If you’d like [...]

Technical Support Case Studies and Capstone (Coursera)

May 6th 2024
Technical Support Case Studies and Capstone (Coursera)
Course Auditing
Categories
Effort
Languages
This course allows you to show what you’ve learned in the previous IT Technical Support professional certification courses and apply that knowledge to realistic situations.

Risk Management: Use of Access Controls to Protect Assets (Coursera)

Course 2: Understanding Risk Management Options and the Use of Access Controls to Protect Assets. In this course, we will focus on understanding risk management options and the use of access controls to protect assets.

Introducing Security: Aligning Asset and Risk Management (Coursera)

Course 1 - Introducing Security and Aligning Asset Management to Risk Management. In this course, we're going to start by discussing the security concepts, identifying corporate assets, and discussing the risk management process.

Cloud and Wireless Security (Coursera)

Course 6: Cloud and Wireless Security. Welcome to course six. This course applies to security concepts, ideas, and considerations to two major changes that we have experienced in recent years. It's regarding the way we use the data.

Maturing Risk Management (Coursera)

May 6th 2024
Maturing Risk Management (Coursera)
Course Auditing
Categories
Effort
Languages
Course 8: Maturing Risk Management. In management science terms, maturing a process or practice means taking positive steps over time to make it more reliable, repeatable and efficient. In practice, this means getting better every day, while showing the measurements that demonstrate improvement and suggest other opportunities to improve. [...]