- 26 Lessons
- 0 Students
- 15 Lessons
- 0 Students
- 0 Lessons
- 0 Students
- 0 Lessons
- 0 Students
- 0 Lessons
- 0 Students
- 0 Lessons
- 0 Students
- 0 Lessons
- 0 Students
- 0 Lessons
- 0 Students
- 0 Lessons
- 0 Students
- 0 Lessons
- 0 Students
- 0 Lessons
- 0 Students
- 21 Lessons
- 0 Students
- 0 Lessons
- 0 Students
- 0 Lessons
- 0 Students
- 10 Lessons
- 0 Students
- 4 Lessons
- 0 Students
- 0 Lessons
- 0 Students
Artificial Intelligence Governance Professional – AIGP
The Artificial Intelligence Governance Professional (AIGP) course is designed to equip professionals with the knowledge and skills necessary to navigate
Certified Cloud Security Officer – CCSO
The Certified Cloud Security Officer (CCSO) course provides professionals with a comprehensive understanding of cloud security principles and practices. This
Protected: Certified DevSecOps Engineer
There is no excerpt because this is a protected post.
Protected: Certified in Risk and Information Systems Control – CRISC
There is no excerpt because this is a protected post.
Protected: Certified in the Governance of Enterprise IT – CGEIT
There is no excerpt because this is a protected post.
Protected: Certified Information Security Auditor – CISA
There is no excerpt because this is a protected post.
Protected: Certified Information Security Manager – CISM
There is no excerpt because this is a protected post.
Protected: Certified Information System Security Officer – CISSO
There is no excerpt because this is a protected post.
Protected: Certified Information Systems Security Professional – CISSP
There is no excerpt because this is a protected post.
Protected: Certified IS Management Systems Lead Implementer
There is no excerpt because this is a protected post.
Protected: Certified Penetration Testing Engineer – CPTE
There is no excerpt because this is a protected post.
Certified Professional Ethical Hacker – CPEH
A Certified Professional Ethical Hacker (CPEH)™ is usually employed by an organization who trusts him or her to attempt to
Protected: Certified Threat Intelligence Analyst – CTIA
There is no excerpt because this is a protected post.
Protected: Certified Vulnerability Assessor – CVA
There is no excerpt because this is a protected post.
Data Classification Framework
The Data Classification Framework course offers participants a thorough understanding of data classification methodologies and their importance in information security.
Protected: EU GDPR Foundations Course
There is no excerpt because this is a protected post.
ISO 27001 Foundations Course
Course benefits: Understand the basics of ISO 27001 Learn the best practices for ISO 27001 compliance Add new skills to