45 Courses:
You’re a qualified security professional and know your industry inside out but now you’ve also been tasked with implementing a new security initiative and your project management skills are lacking… or non-existent … and this initiative is on a tight timeline and budget and simply cannot...
Delivery Method: In Person or Live Virtual
Access control is the restriction of access to a computer system. So how does a cybersecurity professional manage this access control? This course introduces the principles of access controls, beginning with the central modes of information security and continuing through various attacks and...
Delivery Method: Online
When you download an app, or access a database, you want to trust that the software engineer who developed the app had an eye toward security. This course covers the security of applications, data, and hosts in information systems. It provides a comprehensive examination of software development and...
Delivery Method: Online
Companies must protect their assets. Just as locks go on the doors to protect physical assets, electronic and data assets must also be guarded. Asset security involves the full support of everyone in an organization, from corporate-level personnel down to front line employees. Various security...
Delivery Method: Online
In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier...
Delivery Method: Live Virtual
Are you ready for the cloud? The cloud has everyone up in arms when discussing security! The benefits of the Cloud are great; however, many companies have concerns about adopting a cloud architecture due to the inherent security risks of adding this additional architectural layer. This course...
Delivery Method: Live Virtual