ISC2

     

Incident Response and Recovery (Coursera)

https://www.coursera.org/learn/incident-response-and-recovery

Course 4 - Incident Response and Recovery This is the fourth course under the specialization SSCP In this course, we will focus on incident response and recovery. We will explore the incident life cycle as defined by NIST and continue with a deeper look at supporting forensic investigations. We will also extend these ideas and concepts around the theme of business continuity and disaster recovery. Course 4 Learning Objectives After completing this course, the participant will be able to: 

(ISC)² Systems Security Certified Practitioner (SSCP) (CourseraSpecs)

https://www.coursera.org/specializations/sscp-training

Offered by ISC2. Advance Your IT Career with Cybersecurity Skills. Gain Flexibility with Self-Paced Learning.

Access Control (Coursera)

https://www.coursera.org/learn/access-controls

Course 2 - Access Controls This is the second course under the specialization SSCP. In this course, we will examine the business of controlling how our systems, services, resources and data can be Safely accessed only by those authorized to do so. We will discuss authentication methods, trust, the identity management life cycle and access control models. Course 2 Learning Objectives After completing this course, the participant will be able to:  - Categorize identity and access managem

Access Control Concepts (Coursera)

https://www.coursera.org/learn/access-control-concepts

Welcome to course 3 of 5 of this Specialization, Access Control Concepts. In Course 1, we introduced access control concepts. Now, we will take a more detailed look at the types of access control that every information security professional should be familiar with. We will discuss both physical and logical controls and how they are combined to strengthen the overall security of an organization. This is where we describe who gets access to what, why access is necessary, and how that access is ma

Certified in Cybersecurity (CourseraSpecs)

https://www.coursera.org/specializations/certified-in-cybersecurity

Offered by ISC2. Advance Your IT Career with Cybersecurity Skills. Gain Flexibility with Self-Paced Learning

Cloud and Wireless Security (Coursera)

https://www.coursera.org/learn/sscp-4th-ed-course-6

Course 6: Cloud and Wireless Security Welcome to course six. This course applies to security concepts, ideas, and considerations to two major changes that we have experienced in recent years. It's regarding the way we use the data. First, we use our data on the go. In other words, data services are provided to our mobile phones, Wi-Fi, and other devices. Second, many enhanced functions are implemented through services hosted in the cloud platform, where our data is stored or processed. Both tra

Cryptography (Coursera)

https://www.coursera.org/learn/cryptography1

Course 5 - Cryptography This is the fifth course under the specialization SSCP. In this course, we will explore the field of cryptography, including public-key infrastructures (PKIs), certificates, and digital signing. Here we enter the realm of confidentiality, integrity, and availability, since we use cryptography to protect data from unauthorized disclosure and improper modification and use encryption to regulate the ability of users to log in to systems and applications. Course 5 Learni

Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery (Coursera)

https://www.coursera.org/learn/incident-response-recovery-risks-sscp

Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk.You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. Afte

Incident Detection and Response (Coursera)

https://www.coursera.org/learn/sscp-4th-ed-course-7

Course 7: Incident Detection and Response Welcome to course seven, Incident Detection and Response. Having an intruder inside your systems for months unnoticed by your systems, administrators, security specialists, and end-users is tantamount to giving the intruder, the keys to your business or organization. In many cases, organizations discover that they have been subjected to a data breach when they are told by others that their private data has been offered for sale on the dark web. Many lea

Incident Response, BC, and DR Concepts (Coursera)

https://www.coursera.org/learn/incident-response-bc-and-dr-concepts

Welcome to course 2 of 5 of this Specialization, Incident Response, BC, and DR Concepts. This course focuses on the availability part of the CIA triad and the importance of maintaining availability of both human and system resources. These are usually accomplished through the implementation of Incident Response (IR), Business Continuity (BC) and Disaster Recovery (DR) plans. While these three plans may seem to overlap in scope, they are three distinct plans that are vital to the survival of any

Introducing Security: Aligning Asset and Risk Management (Coursera)

https://www.coursera.org/learn/sscp-4th-ed-course-1

Course 1 - Introducing Security and Aligning Asset Management to Risk Management In this course, we're going to start by discussing the security concepts, identifying corporate assets, and discussing the risk management process. Course 1 Learning Objectives After completing this course, the participant will be able to:  L1.1 - Classify information security and security concepts.   L1.2 - Summarize components of the asset management lifecycle.  L1.3 - Identify common risks and vulnerabili

ISC2 Essentials of Cloud Certificate (CourseraSpecs)

https://www.coursera.org/specializations/cloudcyber

Offered by ISC2. Demonstrate Knowledge of Essential Cloud Concepts

ISC2 Healthcare Certificate (CourseraSpecs)

https://www.coursera.org/specializations/cyberhealthcare

Offered by ISC2. Learn Vital Security Strategies within Healthcare. Cybersecurity is critical to address the unique challenges of protecting ...

Maturing Risk Management (Coursera)

https://www.coursera.org/learn/sscp-4th-ed-course-8

Course 8: Maturing Risk Management In management science terms, maturing a process or practice means taking positive steps over time to make it more reliable, repeatable and efficient. In practice, this means getting better every day, while showing the measurements that demonstrate improvement and suggest other opportunities to improve. As we saw in chapters one and two risk management for information intensive organizations works best when using evidence-based reasoning to identify, characteri

Network and Communications Security (Coursera)

https://www.coursera.org/learn/network-and-communications-security

Course 6 - Network and Communications Security This is the sixth course under the specialization SSCP. This course includes an orientation to the network neighborhood via the OSI 7-Layer and TCP/IP models in the context of internetworking and communications. It also probes each of the seven layers of this combined protocol stack, introducing the key technologies at each layer and their normal uses. There is also information on various protocols that run on top of this architecture, as well as

Networks and Communications Security (Coursera)

https://www.coursera.org/learn/network-security-communications-sscp

Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted. Concepts for both public and private communication networks will be discussed. Course Objectives 1. Describe network-related security issues 2. Identify protec

Risk Identification, Monitoring, and Analysis (Coursera)

https://www.coursera.org/learn/risk-identification-monitoring-and-analysis

Course 3 - Risk Identification, Monitoring and Analysis This is the third course under the specialization SSCP In this course, we will explore how to manage the risks related to information systems. It is time to bring these ideas together in a context of continuous maturity modeling, measuring, and monitoring, which we will see is focused on the here and now. Risk alignment works best at the strategic, long-term level of planning; risk maturation, by contrast, can be most effective when cons

Risk Management: Use of Access Controls to Protect Assets (Coursera)

https://www.coursera.org/learn/sscp-4th-ed-course-2

Course 2: Understanding Risk Management Options and the Use of Access Controls to Protect Assets In this course, we will focus on understanding risk management options and the use of access controls to protect assets. We will start by examining the basic steps that must be in place to develop a security culture within the organization and impacting policies. We will also look into how to write and use them to enforce security requirements. Then we will move on to the actual business of control

Securing Software, Data and End Points (Coursera)

https://www.coursera.org/learn/sscp-4th-ed-course-4

Course 4: Securing Software, Data and End Points Welcome to Course Four. As we know, most attacks against systems involve exploiting vulnerabilities in software that powers hardware. Additionally, attackers may exploit vulnerabilities in the underlying hardware, especially when that hardware is for the protected against being stolen or accessed with unauthorized use, but their real target and all the tax is data. Therefore, it's so critical, the total set of software powering an organization's

Security Awareness Training (Coursera)

https://www.coursera.org/learn/security-awareness-training

The security of an organization is of the utmost importance and every member of the organization's staff plays a vital role in defending against cyber threats. One of the best ways to protect the organization is to institute a company-wide security-awareness training initiative. This course is a complete foundational security awareness training program that covers a wide array of topics for nearly every type of end-user and learner level. The content is designed to allow organizations to be ab

Security Concepts and Practices (Coursera)

https://www.coursera.org/learn/security-concepts-and-practices

Course 1 - Security Concepts and Practices This is the first course under the specialization SSCP. In this course, we will focus on the core aspects of security concepts and practice, starting with the importance of codes of ethics. We will then cover the basic principles of information security and move on to describe security controls, their implementation, maintenance, and assessment. We will also address the identification of corporate assets and the change management life cycle. We will

Security Operations (Coursera)

https://www.coursera.org/learn/security-operations

Welcome to course 5 of 5 of this Specialization, Security Operations. This course focuses our attention on the day-to-day, moment-by-moment active use of the security controls and risk mitigation strategies that an organization has in place. We will explore ways to secure the data and the systems they reside on, and how to encourage secure practices among people who interact with the data and systems during their daily duties. After completing this course, the participant will be able to:  E

Security Operations and Administration (Coursera)

https://www.coursera.org/learn/security-operations-administration-sscp

Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined. This will ensure the proper handling of all hard copy and electronic information.

Security Principles (Coursera)

https://www.coursera.org/learn/-security-principles

Welcome to course 1 of 5 of this Specialization, Security Principles. After completing this course, the participant will be able to:  Discuss the foundational concepts of cybersecurity principles. - Recognize foundational security concepts of information assurance. - Define risk management terminology and summarize the process. - Relate risk management to personal or professional practices. - Classify types of security controls. - Distinguish between policies, procedures, standards, regulati

Systems and Application Security (Coursera)

https://www.coursera.org/learn/systems-and-application-security

Course 7 - Systems and Application Security This is the seventh course under the specialization SSCP. This course discusses two major changes in recent years to how we use our data: going mobile and using the cloud. First, we use our data on the go by means of data services provided to our mobile phones, Wi-Fi, and other devices. Second, so many of the enhanced functions we take for granted in our daily personal and professional lives are made possible by cloud services, where our data is sto