Courses

We found 13 courses available for you
See
-17%

Certified in Risk and Information Systems Control – CRISC

41 Lessons
Intermediate

ISACA’s Certified in Risk and Information Systems Control (CRISC®) certification …

What you'll learn
Prepare for the Certified in Risk and Information Systems Control exam.
Understanding enterprise risk.
Plan, execute, scrutinize and retain information systems controls.
Risk: identification, evaluation, assessment, response, and monitoring.
IS control design and execution.
IS control maintenance and monitoring.
-27%

PRINCE2 Agile Foundation Certification

18 Lessons
Intermediate

The importance of project management in the modern world of …

What you'll learn
Communication
Leadership
Time management
Negotiating
Organization
Risk management
Problem-solving
Operational management
Leading change
Customer service
Agility
-10%

Certified Information Security Manager – CISM

13 Lessons
Intermediate

ISACA’s Certified Information Security Manager (CISM) certification indicates expertise in …

-10%

Certified Information Systems Auditor – CISA

74 Lessons
Intermediate

Validate your expertise and get the leverage you need to …

What you'll learn
Validate your expertise and move up in your career as an information systems auditor
Achieve a world-renowned standard through CISA certification for auditing, monitoring, and assessing enterprise IT systems
Get instant recognition with CISA from stakeholders, external auditors, regulators, and other professionals
Kickstart your Information Systems Auditor career with a globally-acknowledged CISA certification from ISACA
Create effective teams that adhere to enterprise objectives through heightened control and monitoring
Achieve a minimum of 22% salary increase through CISA credential
Be part of an esteemed group of over 150K+ CISA certified professionals globally
-20%

Certified Ethical Hacker – CEH v11

149 Lessons
Intermediate

CEH stands for Certified Ethical Hacker, and it is arguably …

What you'll learn
The step-by-step process and tactics utilized by hackers to penetrate systems
Trojans, backdoors, and countermeasures to stop attacks
Powershell, Oracle databases, hacking SQL, Apache Web servers, and more
Network, mobile application security, and assess threats and vulnerabilities
Information assurance and managing information security
Advanced hacking concepts, smartphone hacking, writing virus codes, corporate espionage, and reverse engineering
IDS, firewalls, wireless hacking, and more
-7%

Certified Information Systems Security Professional – CISSP

64 Lessons
Intermediate

Certified Information Systems Security Professional (CISSP) is one of the …

What you'll learn
A holistic understanding of information security aspects in an organization
Defining the architecture, design, and management of IT security
Necessary skills required to become a CISSP certified professional
Gain a thorough understanding of all the 8 domains prescribed in the ISC2 CISSP Common Body of Knowledge (CBK)
Optimizing security operations in an enterprise
Access control systems and various methodologies that complement IT Security and governance for an enterprise
-20%

Certified Cloud Security Professional – CCSP

40 Lessons
Intermediate

Gain expertise in cloud security architecture, design, applications, and operations …

What you'll learn
A holistic understanding of cloud security aspects in an organization
Designing, managing, and securing data on cloud platforms
Necessary skills required to become a CCSP certified professional
Gain a thorough understanding of all the 6 domains prescribed in the ISC2 CCSP Common Body of Knowledge (CBK)
Various as-a-service delivery models that include PaaS, SaaS, IaaS, and others to the cloud architecture
Best practices of cloud security architecture, its design, operations, and overall service orchestration
-17%
PMI

Program Management Professional – PgMP

124 Lessons
Intermediate

The Program Management Professional (PgMP)® credential from Project Management Institute …

What you'll learn
Identifying Your Objectives
Planning Your Program
Engaging Your Stakeholders
Governing​ ​Your​ ​Program
Executing Your Program Successfully
Sustaining Your Program’s Benefits After Delivery
Need Help? Chat with us