Cyber Security FundamentalsLearn the fundamentals of cyber security, data privacy, global laws and regulations including most noted cyber breaches, security risks, security technologies, and the best security practices.
Global Laws and RegulationsBeing compliant with applicable laws and regulations is one of the four major goals of an information security program. Because of the growing importance of information security, there are many laws and regulations, and we can expect more to emerge in the coming years. This course outlines a few of the more common laws and regulations you're likely to find in multinational organizations.
Cyber Threat IntelligenceAccording to NIST, a cyber-threat is, "Any circumstance "or event with the potential to adversely impact "organizational operations, organizational assets, "individuals, or other organizations through "an information system via unauthorized access, "destruction, disclosure, modification of information, "and/or denial of service." Learn how cyber-criminals take advantage of vulnerabilities in technologies, processes, and humans in order to cause damage.
Security Governance ExpertSecurity governance helps organizations minimize information risks and costs while maximizing their value. This course covers developing policies, business cases, implementing an information security strategy, developing a governance framework, and other key components of a security governance program.
Data Privacy Expert"Data privacy has quickly and dramatically become one of the most important tech issues in the world and affects virtually every institution—businesses, governments, non-profits/NGOs, and more—that uses data. Get an introduction to the basics of data privacy: what it is, why it matters, and who it impacts, from consumers and private citizens to policymakers and C-suite business leaders.
Risk Management ProfessionalRisk Management is one of the most important areas of cybersecurity—and yet it's one of the most overlooked areas by technicians and technical managers in the industry. This training program focuses on topics related to the security policy framework, risk mitigation strategies and controls, risk management approach, vendor risk management strategies, risk communication, and control options including procedures related to penetration testing and management reviews.