Cybersecurity
Showing 1105–1116 of 1211 results
The Information Systems Auditing Process: Conducting an Audit
As an auditor, you need to understand the techniques of auditing in order to provide audits efficiently and effectively. This course will help you gain an essential understanding of how to conduct information systems audits.
The Information Systems Auditing Process: IT Governance
This course is essential for effective IT auditing. It outlines the focus areas and objectives of auditing the very governance of the IT function as part of information systems auditing.
The Information Systems Auditing Process: IT Management
Auditors are required to provide insight and analysis for the effective management of IT investment and operations. This course will equip you with the knowledge you need to perform audits of IT management.
The IT Ops Sessions: Enhancing SASE with SD-WAN Security
In this IT Ops Session, you’ll learn why, how, and when to combine SD- WAN with SASE.
The IT Ops Sessions: Hardening Okta against Phishing Attacks
In this IT Ops session, you’ll learn practical steps to harden Okta against phishing attacks, informed by attacks seen in 2022.
The IT Ops Sessions: Protect Windows Clients with Defender for Endpoint
In this IT Ops session, you’ll learn how Microsoft’s endpoint detection and response platform, Defender for Endpoint, has grown to become a leader in its field.
The IT Ops Sessions: Secure Access Service Edge (SASE): Evolving Networking and Security
In this IT Ops session, you’ll learn how SASE has evolved networking and security to meet todays demands.
The IT Ops Sessions: Should I Switch to PowerShell 7?
In this IT Ops session, you’ll develop a clear understanding of the similarities and differences between PowerShell 5.1 Desktop and PowerShell 7.x Core. You'll then be in an informed position to consider and plan your migration.
The IT Ops Sessions: Zero Trust Technologies – Designing and Deploying Microsegmentation
In this IT Ops session, you’ll learn to design and deploy microsegmentation throughout your enterprise.
The State of GDPR: Common Questions and Misperceptions
In this course, you’ll learn how to distinguish fact from misperception when it comes to the General Data Protection Regulation (GDPR) and get answers to many commonly asked GDPR questions.
Threat Hunt with IBM Security QRadar
The threat hunter is responsible for investigating malicious activity on the environment and detecting advanced persistent threats (APTs). This course will teach you how to hunt for threats using the IBM Security QRadar SIEM.
Threat Hunt with PowerShell
As a defensive security professional, you're responsible for improving defenses by performing threat hunting exercises. This course will teach you how to perform threat hunting with PowerShell within a Microsoft environment.