Showing 9217–9228 of 18767 results
Information and Cyber Security GRC: Commission and Manage Penetration Tests
Penetration testing is a proven tool in the fight against those who want to attack us. This course will teach you the steps to prepare for and what to expect during the pentest to make the most effective use of time and money.
Information and Cyber Security GRC: Compliance Assessment and Reporting
This course will teach you how to think about security compliance assessments and how to get started performing assessments.
Information and Cyber Security GRC: Compliance with External Factors
This course will teach you to identify, categorize, and apply laws, regulations, and standards to meet external requirements.
Information and Cyber Security GRC: Governance
This course will teach you some practical applications of GRC concepts necessary to establish, measure, and maintain a security governance program.
Information and Cyber Security GRC: Risk Management
This course will teach you common procedures to complete practical risk assessments to understand your current information security risk exposure.
Information and Cyber Security GRC: Risk Management Frameworks and Structures
All organizations face varying risks related to their mission, strategies, and goals. This course will teach you the techniques used to manage risks and a selection of frameworks that can be used.
Information and Cyber Security GRC: Supply Chain and Third-party Risk
Managing third-party risks is an essential component of any organization’s security program. This course will teach you to evaluate risks from vendors or other third-parties, develop a useful program, and maintain it for your organization.
Information and Cyber Security Literacy: Governance, Risk, and Compliance
Governance, Risk, and Compliance establishes what information security an organization does. This course will teach you about each of the GRC functions and how they are interrelated.
Information and Cyber Security Literacy: Security Engineering and Architecture
This course will teach you how security must be embedded in all organizational technology using security architecture and engineering concepts.
Information Gathering and Vulnerability Scanning for CompTIA Pentest+
Reconnaissance is one of the most important phases in a penetration testing engagement. This course will teach you how to perform information gathering and vulnerability scanning needed for the CompTIA Pentest+ certification.
Information Gathering with Kali Linux
This course is all about introducing the learner to the 01 Information Gathering section of Kali . You'll learn about about a few of the tools available on the Kali platform and how they can be used to gather key information on your target.
Information Governance: CCPA
The California Consumer Privacy Act of 2018 is now in effect. This course will teach you the different aspects of this law and how it applies to individuals and organizations alike.