ISC2 |
(ISC)² Systems Security Certified Practitioner (SSCP) (CourseraSpecs) https://www.coursera.org/specializations/sscp-training Offered by ISC2. Advance Your IT Career with Cybersecurity Skills. Gain Flexibility with Self-Paced Learning. |
Access Control Concepts (Coursera) https://www.coursera.org/learn/access-control-concepts Welcome to course 3 of 5 of this Specialization, Access Control Concepts. In Course 1, we introduced access control concepts. Now, we will take a more detailed look at the types of access control that every information security professional should be familiar with. We will discuss both physical and logical controls and how they are combined to strengthen the overall security of an organization. This is where we describe who gets access to what, why access is necessary, and how that access is ma |
Certified in Cybersecurity (CourseraSpecs) https://www.coursera.org/specializations/certified-in-cybersecurity Offered by ISC2. Advance Your IT Career with Cybersecurity Skills. Gain Flexibility with Self-Paced Learning |
Cloud and Wireless Security (Coursera) https://www.coursera.org/learn/sscp-4th-ed-course-6 Course 6: Cloud and Wireless Security Welcome to course six. This course applies to security concepts, ideas, and considerations to two major changes that we have experienced in recent years. It's regarding the way we use the data. First, we use our data on the go. In other words, data services are provided to our mobile phones, Wi-Fi, and other devices. Second, many enhanced functions are implemented through services hosted in the cloud platform, where our data is stored or processed. Both tra |
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery (Coursera) https://www.coursera.org/learn/incident-response-recovery-risks-sscp Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk.You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. Afte |
Incident Detection and Response (Coursera) https://www.coursera.org/learn/sscp-4th-ed-course-7 Course 7: Incident Detection and Response Welcome to course seven, Incident Detection and Response. Having an intruder inside your systems for months unnoticed by your systems, administrators, security specialists, and end-users is tantamount to giving the intruder, the keys to your business or organization. In many cases, organizations discover that they have been subjected to a data breach when they are told by others that their private data has been offered for sale on the dark web. Many lea |
Incident Response, BC, and DR Concepts (Coursera) https://www.coursera.org/learn/incident-response-bc-and-dr-concepts Welcome to course 2 of 5 of this Specialization, Incident Response, BC, and DR Concepts. This course focuses on the availability part of the CIA triad and the importance of maintaining availability of both human and system resources. These are usually accomplished through the implementation of Incident Response (IR), Business Continuity (BC) and Disaster Recovery (DR) plans. While these three plans may seem to overlap in scope, they are three distinct plans that are vital to the survival of any |
Introducing Security: Aligning Asset and Risk Management (Coursera) https://www.coursera.org/learn/sscp-4th-ed-course-1 Course 1 - Introducing Security and Aligning Asset Management to Risk Management In this course, we're going to start by discussing the security concepts, identifying corporate assets, and discussing the risk management process. Course 1 Learning Objectives After completing this course, the participant will be able to: L1.1 - Classify information security and security concepts. L1.2 - Summarize components of the asset management lifecycle. L1.3 - Identify common risks and vulnerabili |
Maturing Risk Management (Coursera) https://www.coursera.org/learn/sscp-4th-ed-course-8 Course 8: Maturing Risk Management In management science terms, maturing a process or practice means taking positive steps over time to make it more reliable, repeatable and efficient. In practice, this means getting better every day, while showing the measurements that demonstrate improvement and suggest other opportunities to improve. As we saw in chapters one and two risk management for information intensive organizations works best when using evidence-based reasoning to identify, characteri |
Networks and Communications Security (Coursera) https://www.coursera.org/learn/network-security-communications-sscp Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted. Concepts for both public and private communication networks will be discussed. Course Objectives 1. Describe network-related security issues 2. Identify protec |
Risk Management: Use of Access Controls to Protect Assets (Coursera) https://www.coursera.org/learn/sscp-4th-ed-course-2 Course 2: Understanding Risk Management Options and the Use of Access Controls to Protect Assets In this course, we will focus on understanding risk management options and the use of access controls to protect assets. We will start by examining the basic steps that must be in place to develop a security culture within the organization and impacting policies. We will also look into how to write and use them to enforce security requirements. Then we will move on to the actual business of control |
Securing Software, Data and End Points (Coursera) https://www.coursera.org/learn/sscp-4th-ed-course-4 Course 4: Securing Software, Data and End Points Welcome to Course Four. As we know, most attacks against systems involve exploiting vulnerabilities in software that powers hardware. Additionally, attackers may exploit vulnerabilities in the underlying hardware, especially when that hardware is for the protected against being stolen or accessed with unauthorized use, but their real target and all the tax is data. Therefore, it's so critical, the total set of software powering an organization's |
Security Awareness Training (Coursera) https://www.coursera.org/learn/security-awareness-training The security of an organization is of the utmost importance and every member of the organization's staff plays a vital role in defending against cyber threats. One of the best ways to protect the organization is to institute a company-wide security-awareness training initiative. This course is a complete foundational security awareness training program that covers a wide array of topics for nearly every type of end-user and learner level. The content is designed to allow organizations to be ab |
Security Operations (Coursera) https://www.coursera.org/learn/security-operations Welcome to course 5 of 5 of this Specialization, Security Operations. This course focuses our attention on the day-to-day, moment-by-moment active use of the security controls and risk mitigation strategies that an organization has in place. We will explore ways to secure the data and the systems they reside on, and how to encourage secure practices among people who interact with the data and systems during their daily duties. After completing this course, the participant will be able to: E |
Security Operations and Administration (Coursera) https://www.coursera.org/learn/security-operations-administration-sscp Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined. This will ensure the proper handling of all hard copy and electronic information. |
Security Principles (Coursera) https://www.coursera.org/learn/-security-principles Welcome to course 1 of 5 of this Specialization, Security Principles. After completing this course, the participant will be able to: Discuss the foundational concepts of cybersecurity principles. - Recognize foundational security concepts of information assurance. - Define risk management terminology and summarize the process. - Relate risk management to personal or professional practices. - Classify types of security controls. - Distinguish between policies, procedures, standards, regulati |