Showing 7189–7200 of 14641 results
Influencing without Authority: Becoming an Agent of Change
Influencing without authority is the ability to influence others when you do not have direct responsibility for them. This course will teach you relevant skills to help employees assert themselves to influence positive change in their workplace.
Information and Cyber Security Governance, Risk and Compliance (GRC)
GRC determines the information and cyber security an organization does. This course will teach you the fundamentals of governance, risk, compliance with external obligations, and assurance, and how they work together to keep an organization secure.
Information and Cyber Security GRC: Commission and Manage Penetration Tests
Penetration testing is a proven tool in the fight against those who want to attack us. This course will teach you the steps to prepare for and what to expect during the pentest to make the most effective use of time and money.
Information and Cyber Security GRC: Compliance Assessment and Reporting
This course will teach you how to think about security compliance assessments and how to get started performing assessments.
Information and Cyber Security GRC: Compliance with External Factors
This course will teach you to identify, categorize, and apply laws, regulations, and standards to meet external requirements.
Information and Cyber Security GRC: Governance
This course will teach you some practical applications of GRC concepts necessary to establish, measure, and maintain a security governance program.
Information and Cyber Security GRC: Risk Management
This course will teach you common procedures to complete practical risk assessments to understand your current information security risk exposure.
Information and Cyber Security GRC: Risk Management Frameworks and Structures
All organizations face varying risks related to their mission, strategies, and goals. This course will teach you the techniques used to manage risks and a selection of frameworks that can be used.
Information and Cyber Security GRC: Supply Chain and Third-party Risk
Managing third-party risks is an essential component of any organization’s security program. This course will teach you to evaluate risks from vendors or other third-parties, develop a useful program, and maintain it for your organization.
Information and Cyber Security Literacy: Governance, Risk, and Compliance
Governance, Risk, and Compliance establishes what information security an organization does. This course will teach you about each of the GRC functions and how they are interrelated.
Information and Cyber Security Literacy: Security Engineering and Architecture
This course will teach you how security must be embedded in all organizational technology using security architecture and engineering concepts.
Information Gathering with Kali Linux
This course is all about introducing the learner to the 01 Information Gathering section of Kali . You'll learn about about a few of the tools available on the Kali platform and how they can be used to gather key information on your target.