Free Online

(ISC)² Courses

Show filters

Level

Duration

Subject

Language

(ISC)² Systems Security Certified Practitioner (SSCP)

(ISC)² Systems Security Certified Practitioner (SSCP)

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreePursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification.Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together.3 Steps to Career Advancement1. Register for the course2. Gain access for 120 days3. Register and sit for the SSCP certification examUpon completing the SSCP Professional Certificate, you will:1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below.Course 1 - Access ControlsCourse 2 - Security Operations and AdministrationCourse 3 - Risk Identification, Monitoring, and Analysis/Incident Response and RecoveryCourse 4 - CryptographyCourse 5 - Network and Communication SecurityCourse 6 - Systems and Application Security2. Receive a certificate of program completion.3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability.

Coursera
43 weeks long, 3 hours a week
view all
Access Controls

Access Controls

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeWelcome to Access Controls!The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability.The Access Controls course provides information pertaining to specifying what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level, and is usually predefined based on authority level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability.Objectives1. Describe how to implement Authentication mechanisms2. Identify and operate internetwork trust architectures3. Describe the process of administering identity management life cycle4. Implement the different types of access controls (Subject/Object based)

Coursera
7 weeks long, 15 hours worth of material
upcoming
view all
Security Operations and Administration

Security Operations and Administration

1

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeSecurity operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined. This will ensure the proper handling of all hard copy and electronic information.The Security operations and Administration course addresses basic security concepts and the application of those concepts in the day to day operation and administration of enterprise computer systems and the information that they host.Ethical considerations in general, and the (ISC)2 Code of Ethics in particular, provide the backdrop for any discussion of information security and SSCP candidates will be tested on both. Information security professionals often find themselves in positions of trust and must be beyond reproach in every way.Several core principles of information security stand above all others and this domain covers these principles in some depth. It can be said that the CIA triad of confidentiality, integrity and availability forms the basis for almost everything that we do in information security and the SSCP candidate must not only fully understand these principles but be able to apply them in all situations. additional security concepts covered in this domain include privacy, least privilege, non-repudiation and the separation of duties. Course Objectives1. Define Code of Ethics2. Describe the security concepts3. Document and operate security controls4. Describe the asset management process5. Implement compliance controls6. Assess compliance controls7. Describe the change management process8. Contribute to the security awareness training program9. Contribute to physical security operations

Coursera
6 weeks long, 16 hours worth of material
past
view all
Security Awareness Training

Security Awareness Training

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThe security of an organization is of the utmost importance and every member of the organization's staff plays a vital role in defending against cyber threats. One of the best ways to protect the organization is to institute a company-wide security-awareness training initiative. This course is a complete foundational security awareness training program that covers a wide array of topics for nearly every type of end-user and learner level. The content is designed to allow organizations to be able to provide a comprehensive training program to help them protect their information assets against threats.This training lasts approximately 2 hours and was designed to be engaging and is based on real scenarios staff may face. The training is modular and does not have to be completed in one sitting.Topics included in this course are as follows:• Importance of Security• Data and Account Security• Passwords• Networking and Mobile Security• Malware• Social Engineering

Coursera
1 week long, 2-3 hours worth of material
upcoming
view all
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery

Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery

4

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeRisk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk.You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. After collection of the details from monitoring, we can analyze to determine if the system is being operated in accordance with accepted industry practices, and in compliance with organization policies and procedures. Incident Response and Recovery: In the Incident Response and Recovery Session, you will gain an understanding of how to handle incidents using consistent, applied approaches in order to resolve. Once an incident is identified, action will be necessary in order to resolve. We will examine processes such as damage recovery, data integrity and preservation, and the collection, handling, reporting, and prevention. You will be introduced to the Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) concepts and how they can be utilized in order to mitigate damages, recover business operations, and avoid critical business interruption. Through the use of the DRP, you will understand the procedures for emergency response and post-disaster recovery. Course Objectives1.Describe the risk management process2. Perform security assessment activities3. Describe processes for operating and maintaining monitoring systems4. Identify events of interest5. Describe the various source systems6. Interpret reporting findings from monitoring results7. Describe the incident handling process8. Contribute to the incident handling process based upon role within the organization9. Describe the supporting role in forensics investigation processes10. Describe the supporting role in the business continuity planning process11. Describe the supporting role in the disaster recovery planning process

Coursera
7 weeks long, 23 hours worth of material
upcoming
view all
Systems and Application Security

Systems and Application Security

4

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeWelcome to Systems and Application Security Course!In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Both technical and non-technical attacks will be discussed. You will learn how an organization can protect itself from these attacks. You will learn concepts in endpoint device security, cloud infrastructure security, securing big data systems, and securing virtual environments.Objectives1. Identify malicious code activity2. Describe malicious code and the various countermeasures3. Describe the processes for operating endpoint device security4. Define mobile device management processes5. Describe the process for configuring cloud security6. Explain the process for securing big data systems7. Summarize the process for securing virtual environments

Coursera
6 weeks long, 17 hours worth of material
past
view all
Networks and Communications Security

Networks and Communications Security

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeWelcome to Networks and Communications Security Course!In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted.Concepts for both public and private communication networks will be discussed.Course Objectives1. Describe network-related security issues2. Identify protective measures for telecommunication technologies3. Define processes for controlling network access4. Identify processes for managing LAN-based security5. Describe procedures for operating and configuring networked-basedsecurity devices6. Define procedures to implement and operate wireless technologies

Coursera
6 weeks long, 20 hours worth of material
upcoming
view all
Load more

Level

Duration

Language