33 Courses:

  • Access Control and Identity Management Scenarios

    Access control is the restriction of access to a computer system. So how does a cybersecurity professional manage this access control? This course introduces the principles of access controls, beginning with the central modes of information security and continuing through various attacks and...

    Delivery Method: Online

    Details

  • Application, Data, and Host Security Scenarios

    When you download an app, or access a database, you want to trust that the software engineer who developed the app had an eye toward security. This course covers the security of applications, data, and hosts in information systems. It provides a comprehensive examination of software development and...

    Delivery Method: Online

    Details

  • Asset Security

    Companies must protect their assets. Just as locks go on the doors to protect physical assets, electronic and data assets must also be guarded. Asset security involves the full support of everyone in an organization, from corporate-level personnel down to front line employees. Various security...

    Delivery Method: Online

    Details

  • Certificate in Cybersecurity

    Cybersecurity, also known as Information Security, is the protection of data and personally identifiable information from malicious attacks, theft, and destruction. Failures of cybersecurity policies, both in large corporations and governmental agencies, have earned significant visibility and...

    Delivery Method: Online

    Details

  • Certified Network Forensics Examiner

    The Certified Network Forensics Examiner was originally developed for a U.S. classified government agency. The C)NFE takes a digital and network forensic skill set to the next level by navigating through over twenty modules of network forensic topics. The CNFE provides practical experience through...

    Delivery Method: In Person or Online

    Details

  • Certified Penetration Testing Consultant

    The Certified Penetration Testing Consultant Cyber Security Training Course is designed for IT Security Professionals and IT Network Administrators who are interested in conducting Penetration tests against large network infrastructures similar to large corporate networks, Services Providers and...

    Delivery Method: In Person or Online

    Details