Facebook

Courses

We found 497 courses available for you
See
Free

Emotional Intelligence

Intermediate

Course Description Emotional intelligence, also referred to as Emotional Quotient …

Certified Encryption Specialist | ECES eLearning

5 Lessons
24 hours
Intermediate

Course Description The EC-Council Certified Encryption Specialist (ECES) program introduces …

What you'll learn
Types of Encryption Standards and their differences
How to select the best standard for your organization
How to enhance your pen-testing knowledge in encryption
Correct and incorrect deployment of encryption technologies
Common mistakes made in implementing encryption technologies
Best practices when implementing encryption technologies

IT Risk Fundamentals eLearning

Intermediate

Course Description The IT Risk Certificate Online Course is an online …

PECB Certified ISO 31000 Risk Manager eLearning Training Course

14 Lessons
Intermediate

Course Description As the world is moving faster than ever, …

What you'll learn
Understand the risk management concepts, approaches, methods, and techniques
Learn how to establish a risk management framework in the context of an organization
Learn how to apply the ISO 31000 risk management process in an organization
Understand the basic approaches, methods, and practices used to integrate risk management in an organization

PECB Certified ISO/IEC 27001 Lead Auditor eLearning Training Course

23 Lessons
Intermediate

Course Description As the world is moving faster than ever, …

What you'll learn
Understand the operations of an Information Security Management System based on ISO/IEC 27001
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
Understand an auditor’s role to plan, lead, and follow-up on a management system audit in accordance with ISO 19011
Learn how to lead an audit and audit team
Learn how to interpret the requirements of ISO/IEC 27001 in the context of an ISMS audit
Acquire the competencies of an auditor to plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011

PECB Certified ISO/IEC 27001 Lead Implementer eLearning Training Course

27 Lessons
Intermediate

Course Description As the world is moving faster than ever, …

What you'll learn
Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of an ISMS
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
Understand the operation of an information security management system and its processes based on ISO/IEC 27001
Learn how to interpret and implement the requirements of ISO/ IEC 27001 in the specific context of an organization
Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an ISMS

C)SP – Certified Security Principles eLearning

11 Lessons
40 hours
Intermediate

Course Description Security Principles are your first line of defense, …

CyberSec First Responder® (CFR)

41 Lessons
40 hours
Intermediate

Course Description This course covers network defense and incident response …

What you'll learn
Compare and contrast various threats and classify threat profile
Explain the purpose and use of attack tools and technique
Explain the purpose and use of post exploitation tools and tactic
Explain the purpose and use of social engineering tactic
Given a scenario, perform ongoing threat landscape research and use data to prepare for incident
Explain the purpose and characteristics of various data source Given a scenario, use appropriate tools to analyze log
Given a scenario, use regular expressions to parse log files and locate   meaningful data
Given a scenario, use Windows tools to analyze incidents
Given a scenario, use Linux-based tools to analyze incidents
Summarize methods and tools used for malware analysis
Given a scenario, analyze common indicators of potential compromise
Explain the importance of best practices in preparation for incident response
Given a scenario, execute incident response process
Explain the importance of concepts that are unique to forensic analysis
Explain general mitigation methods and devices