Price:
$3,695.00
Days:
1
Virtual
• Describe security and the alignment of asset management to risk management
• Appraise risk management options and the use of access controls to protect assets
• Examine the field of cryptography to secure information and communication
• Build a security posture by securing software, data, and endpoints
• Apply network and communications security to establish a secure networked environment
• Evaluate cloud and wireless security
• Prepare for incident detection and response
• Implement appropriate measures that contribute to the maturation of risk management
No specific prerequisites are required for this course. Basic computer literacy and familiarity with fundamental concepts in the subject area are recommended for the best learning experience.
• Maturing Risk Management
• Maturing Risk Management
• Maturing Risk Management
• Incident Detection and Response
• Incident Detection and Response
• Incident Detection and Response
• Cloud and Wireless Security
• Cloud and Wireless Security
• Cloud and Wireless Security
• Network and Communications Security
• Network and Communications Security
• Network and Communications Security
• Securing Software, Data, and Endpoints
• Securing Software, Data, and Endpoints
• Securing Software, Data, and Endpoints
• Cryptography
• Cryptography
• Cryptography
• Introducing Security and Aligning Asset Management to Risk Management
• Introducing Security and Aligning Asset Management to Risk Management
• Introducing Security and Aligning Asset Management to Risk Management
• Understanding Risk Management Options and the Use of Access Controls to Protect Assets
• Understanding Risk Management Options and the Use of Access Controls to Protect Assets
• Understanding Risk Management Options and the Use of Access Controls to Protect Assets
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.