Cybersecurity Micro Courses
Registration link for gotowebinar will be provided in the Order Confirmation Email.
Business Continuity
Planning (BCP) is the process a company undergoes to create a Read More...
$4.95
A Business Impact Analysis (BIA) predicts
the consequences of disruption of a business Read More...
$4.95
A Business Impact Analysis (BIA) predicts
the consequences of disruption of a business Read More...
$4.95
An incident
response plan is a set of tools and procedures your security Read More...
$4.95
This course teaches the concept of
developing an effective cybersecurity program and building Read More...
$4.95
The process of identifying, managing,
recording, and analyzing security threats or incidents in Read More...
$4.95
Access Control is a
security technique that regulates who or what can view Read More...
$4.95
Asset management, regarding HIPAA, refers
to tracking and maintaining any device that stores Read More...
$4.95
The backup and recovery timeline provides a
high-level overview of the events that Read More...
$4.95
The Cybersecurity Maturity Model
Certification (CMMC) is a certification procedure developed by the Read More...
$4.95
The science of using mathematics to encrypt
and decrypt data is called cryptography. Read More...
$4.95
A Disaster Recovery Plan (DRP) is a formal
document created by an organization Read More...
$4.95
Encryption is a method
of converting an original message of regular text into Read More...
$4.95
The primary purpose of a cyber risk
assessment is to keep stakeholders informed Read More...
$4.95
The Health Information
Trust Alliance (HITRUST) exists to ensure that information security becomes Read More...
$4.95
Showing 1 to 15 of 30 (2 Pages)