Cybersecurity Micro Courses
Registration link for gotowebinar will be provided in the Order Confirmation Email.
Business Continuity
Planning (BCP) is the process a company undergoes to create a prevention and
r.. Read More...
$4.95
A Business Impact Analysis (BIA) predicts
the consequences of disruption of a business function and.. Read More...
$4.95
A Business Impact Analysis (BIA) predicts
the consequences of disruption of a business function and.. Read More...
$4.95
An incident
response plan is a set of tools and procedures your security team can use to
identify,.. Read More...
$4.95
This course teaches the concept of
developing an effective cybersecurity program and building a win.. Read More...
$4.95
The process of identifying, managing,
recording, and analyzing security threats or incidents in rea.. Read More...
$4.95
Access Control is a
security technique that regulates who or what can view or use resources in a
c.. Read More...
$4.95
Asset management, regarding HIPAA, refers
to tracking and maintaining any device that stores or acc.. Read More...
$4.95
The backup and recovery timeline provides a
high-level overview of the events that occur during the.. Read More...
$4.95
The Cybersecurity Maturity Model
Certification (CMMC) is a certification procedure developed by the.. Read More...
$4.95
The science of using mathematics to encrypt
and decrypt data is called cryptography. Cryptography e.. Read More...
$4.95
A Disaster Recovery Plan (DRP) is a formal
document created by an organization that contains detail.. Read More...
$4.95
Encryption is a method
of converting an original message of regular text into encoded text. The tex.. Read More...
$4.95
The primary purpose of a cyber risk
assessment is to keep stakeholders informed and support proper .. Read More...
$4.95
The Health Information
Trust Alliance (HITRUST) exists to ensure that information security becomes .. Read More...
$4.95
Showing 1 to 15 of 30 (2 Pages)