Security & Privacy Policies and Procedures
Course | 24 minutes
This course helps you refresh your knowledge of security and privacy policies and procedures..
IR, BC and DR Planning and Procedures
Course | 28 minutes
The fundamentals of incident response, business continuity and disaster recovery are explored in six videos.
Effective Incident Management
Course | 25 minutes
Review effective incident management with eight videos on metrics, response procedures and more.
Controls, Metrics and Monitoring
Course | 17 minutes
ITake a closer look at what tools you have with this course on controls, metrics and monitoring for security managers
Security Program Activities
Course | 19 minutes
Explore security program activities with two videos on business case development, program development, documentation and more.
Incident Response and Recovery Procedures
Course | 16 minutes
Prepare for possible trouble with this course on incident response and recovery procedures, including designing systems to facilitate incident response
Securing Communications and Collaboration Solutions
Course | 14 minutes
Secure your communications and collaboration solutions with this course covering BYOD, mobile device management and more.
Security Program Architecture
Course | 22 minutes
nformation security program architecture is reviewed and dissected in ten videos. Controls, objectives, program elements and more provide a strong foundation for an aspiring security manager.
Vulnerability Assessment Methods and Tools
Course | 21 minutes
This course helps you broaden your understanding of vulnerability assessment and tools, including tool lists and test types.
Monitoring and Communication
Course | 6 minutes
Enhance your risk management skills with three videos on risk monitoring and communication.
Software Vulnerabilities and Security Controls
Course | 37 minutes
In this course, we take you through the fundamentals of software vulnerabilities and security controls.
Asset Classification and Operational Considerations
Course | 10 minutes
Review asset classification and operational considerations in five videos, covering vocabulary, diagrams, key terms and important takeaways.
Risk Assessment
Course | 17 minutes
Refresh your knowledge of how bad things can get with this course on the four steps of risk assessment: Prepare, Conduct the Assessment, Report and Communicate and Maintain.
Risk Metric Scenarios
Course | 12 minutes
This course on risk metric scenarios covers analyzing scenarios to secure enterprises and reviewing existing security..
Risk Mitigation Strategies and Controls
Course | 26 minutes
Dive into risk mitigation strategies and controls with this course on risk scenarios, responses and more
Business Continuity Planning
Course | 40 minutes
Review business continuity planning and the challenges of disaster recovery with two videos on business impact analysis, auditing business continuity and more.
Business and Industry Influences and Risks
Course | 15 minutes
Brush up on your knowledge of business and industry influences and risks with this course on enterprise risk management (ERM) and business models.
Strategy and Implementation
Course | 17 minutes
Take a fresh look at risk management strategy and implementation. Includes vocabulary, phases and tips for effective information risk management
Implementation Action Plan
Course | 11 minutes
Two videos help you review action plan types, action plan implementation strategies and information security program objectives.
IS Resources and Constraints
Course | 12 minutes
Information security resources and constraints are examined in this two-video course covering personnel, organizational structure and more.
Information Security Strategy
Course | 21 minutes
Five videos take you through the core tenets of information security strategy, including strategy elements and metrics.
IS Roles and Responsibilities
Course | 6 minutes
Refresh your knowledge of information security roles and responsibilities with three videos on key roles and responsibilities, risk management and associated topics.
Introduction to IS Governance
Course | 11 minutes
Three videos provide an introduction to information security governance, including the use of governance and why it is important for an organization.
Disaster Recovery
Course | 36 minutes
Don’t let a lack of preparedness compound the effects of a disaster. Learn how to create and test a disaster recovery plan in this six-video course.
Preventative & Detective Measures
Course | 39 minutes
Explore ways to prevent cyber threats from impacting your organization, and learn how to quickly detect the threats that do slip through your defenses.
Computer Crime Investigations
Course | 32 minutes
Refresh your knowledge of cybercrime investigations with this overview course covering the investigation process and the discovery of digital evidence.
Access Control Fundamentals
Course | 1 hour 37 minutes
Take a deep dive into one of the fundamental concepts of security: access control. Learn how to give the right people access to the right information in a secure way.
Asset Security
Course | 39 minutes
Learn how to secure sensitive data, including managing and classifying data, working with data at rest and in transit, and implementing data security controls.
Security Policies
Course | 22 minutes
Explore security policies and control frameworks and how they help drive the overall security of an organization.
Risk Management
Course | 49 minutes
Dive deep into risk management, including risk frameworks, assessments and modeling, as well as employee security awareness, vendor security and other issues.
Security & Privacy Policies and Procedures
Course | 24 minutes
This course helps you refresh your knowledge of security and privacy policies and procedures..
IR, BC and DR Planning and Procedures
Course | 28 minutes
The fundamentals of incident response, business continuity and disaster recovery are explored in six videos.
Effective Incident Management
Course | 25 minutes
Review effective incident management with eight videos on metrics, response procedures and more.
Controls, Metrics and Monitoring
Course | 17 minutes
ITake a closer look at what tools you have with this course on controls, metrics and monitoring for security managers
Security Program Activities
Course | 19 minutes
Explore security program activities with two videos on business case development, program development, documentation and more.
Incident Response and Recovery Procedures
Course | 16 minutes
Prepare for possible trouble with this course on incident response and recovery procedures, including designing systems to facilitate incident response
Securing Communications and Collaboration Solutions
Course | 14 minutes
Secure your communications and collaboration solutions with this course covering BYOD, mobile device management and more.
Security Program Architecture
Course | 22 minutes
nformation security program architecture is reviewed and dissected in ten videos. Controls, objectives, program elements and more provide a strong foundation for an aspiring security manager.
Vulnerability Assessment Methods and Tools
Course | 21 minutes
This course helps you broaden your understanding of vulnerability assessment and tools, including tool lists and test types.
Monitoring and Communication
Course | 6 minutes
Enhance your risk management skills with three videos on risk monitoring and communication.
Software Vulnerabilities and Security Controls
Course | 37 minutes
In this course, we take you through the fundamentals of software vulnerabilities and security controls.
Asset Classification and Operational Considerations
Course | 10 minutes
Review asset classification and operational considerations in five videos, covering vocabulary, diagrams, key terms and important takeaways.
Risk Assessment
Course | 17 minutes
Refresh your knowledge of how bad things can get with this course on the four steps of risk assessment: Prepare, Conduct the Assessment, Report and Communicate and Maintain.
Risk Metric Scenarios
Course | 12 minutes
This course on risk metric scenarios covers analyzing scenarios to secure enterprises and reviewing existing security..
Risk Mitigation Strategies and Controls
Course | 26 minutes
Dive into risk mitigation strategies and controls with this course on risk scenarios, responses and more
Business Continuity Planning
Course | 40 minutes
Review business continuity planning and the challenges of disaster recovery with two videos on business impact analysis, auditing business continuity and more.
Business and Industry Influences and Risks
Course | 15 minutes
Brush up on your knowledge of business and industry influences and risks with this course on enterprise risk management (ERM) and business models.
Strategy and Implementation
Course | 17 minutes
Take a fresh look at risk management strategy and implementation. Includes vocabulary, phases and tips for effective information risk management
Implementation Action Plan
Course | 11 minutes
Two videos help you review action plan types, action plan implementation strategies and information security program objectives.
IS Resources and Constraints
Course | 12 minutes
Information security resources and constraints are examined in this two-video course covering personnel, organizational structure and more.
Information Security Strategy
Course | 21 minutes
Five videos take you through the core tenets of information security strategy, including strategy elements and metrics.
IS Roles and Responsibilities
Course | 6 minutes
Refresh your knowledge of information security roles and responsibilities with three videos on key roles and responsibilities, risk management and associated topics.
Introduction to IS Governance
Course | 11 minutes
Three videos provide an introduction to information security governance, including the use of governance and why it is important for an organization.
Disaster Recovery
Course | 36 minutes
Don’t let a lack of preparedness compound the effects of a disaster. Learn how to create and test a disaster recovery plan in this six-video course.
Preventative & Detective Measures
Course | 39 minutes
Explore ways to prevent cyber threats from impacting your organization, and learn how to quickly detect the threats that do slip through your defenses.
Computer Crime Investigations
Course | 32 minutes
Refresh your knowledge of cybercrime investigations with this overview course covering the investigation process and the discovery of digital evidence.
Access Control Fundamentals
Course | 1 hour 37 minutes
Take a deep dive into one of the fundamental concepts of security: access control. Learn how to give the right people access to the right information in a secure way.
Asset Security
Course | 39 minutes
Learn how to secure sensitive data, including managing and classifying data, working with data at rest and in transit, and implementing data security controls.
Security Policies
Course | 22 minutes
Explore security policies and control frameworks and how they help drive the overall security of an organization.
Risk Management
Course | 49 minutes
Dive deep into risk management, including risk frameworks, assessments and modeling, as well as employee security awareness, vendor security and other issues.