6 Courses:

  • Certificate in Cybersecurity

    Cybersecurity, also known as Information Security, is the protection of data and personally identifiable information from malicious attacks, theft, and destruction. Failures of cybersecurity policies, both in large corporations and governmental agencies, have earned significant visibility and...

    Delivery Method: Online

    Details

  • CISSP® Exam Prep Course

    The CISSP® Exam Prep Course prepares test-takers for the Certified Information Systems Security Professional exam, as administered by the International Information System Security Certification Consortium (ISC)2. The CISSP® certification is recognized worldwide and adheres to the strict standards...

    Delivery Method: Online

    Details

  • CISSP® Practice Exams and Exam Strategies

    This course is designed to give learners an assessment of their readiness to take ISC2's CISSP® Exam. It contains two 120-question practice exams, which cover The International Information System Security Certification Consortium's eight domains: Security and Risk Management Asset Security...

    Delivery Method: Online

    Details

  • Introduction to Cybersecurity

    Globally, incidents of data breaches, identity thefts, and cybercrimes are on the rise, along with the explosive growth of online personal data and the expansion of computer networks. This course teaches the fundamental concepts of information security one will encounter in the cybersecurity field....

    Delivery Method: Online

    Details

  • Security and Risk Management

    This course covers the role of governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. The course also includes a look at how modern...

    Delivery Method: Online

    Details

  • Threats and Vulnerabilities Scenarios

    This course examines the process of identifying and mitigating threats and vulnerabilities in information systems. It covers common categories of threats and vulnerabilities and the resources used to detect them. This course also features a number of fictional scenarios based on threats and...

    Delivery Method: Online

    Details