Filter Keyword to...

Category: IT Professionals

Results Per Page :
The (ISC)² Certified Information Systems Security Professional (CISSP) exam has been reorganized for 2015. No content has been removed, but there has been lots of reorganization, and the context of existing...
[READ MORE]
The (ISC)² Certified Information Systems Security Professional (CISSP) exam has been reorganized for 2015. No content has been removed, but there has been lots of reorganization, and the context of existing information is subtly different. This Skillsoft course will get you on the right track to begin your CISSP study.
The (ISC)² Certified Information Systems Security Professional (CISSP) exam has been reorganized for 2015. No content has been removed, but there has been lots of reorganization, and the context of existing information is subtly different. This Skillsoft course will get you on the right track to begin your CISSP study.
[READ LESS]
Produced by: SkillSoft
In this course youll learn how to configure categories and chat room policies. Conferencing provides a means for users to have meetings to facilitate collaboration. In this course, youll also learn how to...
[READ MORE]
In this course youll learn how to configure categories and chat room policies. Conferencing provides a means for users to have meetings to facilitate collaboration. In this course, youll also learn how to manage meetings. This course aligns with exam 70-334, Core Solutions of Microsoft Skype for Business 2015.
In this course youll learn how to configure categories and chat room policies. Conferencing provides a means for users to have meetings to facilitate collaboration. In this course, youll also learn how to manage meetings. This course aligns with exam 70-334, Core Solutions of Microsoft Skype for Business 2015.
[READ LESS]
Produced by: SkillSoft
Since Chef is an ace configuration management tool, an in-depth knowledge of its advanced features is a fundamental requirement for a skilled DevOps engineer. In this course, you will learn the inner workings...
[READ MORE]
Since Chef is an ace configuration management tool, an in-depth knowledge of its advanced features is a fundamental requirement for a skilled DevOps engineer. In this course, you will learn the inner workings of Chef, such as managing cookbooks and using troubleshooting tools. This course also covers virtualization, user management, and server configuration.
Since Chef is an ace configuration management tool, an in-depth knowledge of its advanced features is a fundamental requirement for a skilled DevOps engineer. In this course, you will learn the inner workings of Chef, such as managing cookbooks and using troubleshooting tools. This course also covers virtualization, user management, and server configuration.
[READ LESS]
Produced by: SkillSoft
Performing successful information system audits includes the ability to determine if the organization has an effective governance framework in place, including accountability and monitoring practices that are...
[READ MORE]
Performing successful information system audits includes the ability to determine if the organization has an effective governance framework in place, including accountability and monitoring practices that are adhered to. This course covers governance best practices including information security governance, responsible IT governance committee practices, and enterprise architecture. This course also outlines IS strategy, value, and policies best practices including strategic planning, IT portfolio management, policies, and procedures. Finally this course covers best organizational practices for risk management and IT management, including organizational change management, financial management, and human resources management practices. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
Performing successful information system audits includes the ability to determine if the organization has an effective governance framework in place, including accountability and monitoring practices that are adhered to. This course covers governance best practices including information security governance, responsible IT governance committee practices, and enterprise architecture. This course also outlines IS strategy, value, and policies best practices including strategic planning, IT portfolio management, policies, and procedures. Finally this course covers best organizational practices for risk management and IT management, including organizational change management, financial management, and human resources management practices. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
[READ LESS]
Produced by: SkillSoft
IS auditors require the skills and ability to assess an organization's overall structure and division of responsibilities. This course covers best practices for IT organizational structure and responsibility...
[READ MORE]
IS auditors require the skills and ability to assess an organization's overall structure and division of responsibilities. This course covers best practices for IT organizational structure and responsibility activities including segregation of duties and contractual commitments. This course also outlines best practices for business continuity planning including effective processes, policies, business impact analysis, and plan testing. Finally this course covers specific knowledge for effective business continuity auditing including evaluating test results, offsite storage, and security practices. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
IS auditors require the skills and ability to assess an organization's overall structure and division of responsibilities. This course covers best practices for IT organizational structure and responsibility activities including segregation of duties and contractual commitments. This course also outlines best practices for business continuity planning including effective processes, policies, business impact analysis, and plan testing. Finally this course covers specific knowledge for effective business continuity auditing including evaluating test results, offsite storage, and security practices. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
[READ LESS]
Produced by: SkillSoft
A key responsibility of IS auditing professionals is understanding and ensuring that the method in which organizations conduct IS acquisition, development, testing, and implementation activities support and...
[READ MORE]
A key responsibility of IS auditing professionals is understanding and ensuring that the method in which organizations conduct IS acquisition, development, testing, and implementation activities support and fulfill organizational objectives and strategic goals. This course covers best practices for IS development and project management structure and planning. This course also covers business application systems best practices including virtualization and cloud computing environments, and application development methods. Finally this course provides relevant information on IS maintenance practices, system development activities, application controls, and best practices for auditing application controls. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
A key responsibility of IS auditing professionals is understanding and ensuring that the method in which organizations conduct IS acquisition, development, testing, and implementation activities support and fulfill organizational objectives and strategic goals. This course covers best practices for IS development and project management structure and planning. This course also covers business application systems best practices including virtualization and cloud computing environments, and application development methods. Finally this course provides relevant information on IS maintenance practices, system development activities, application controls, and best practices for auditing application controls. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
[READ LESS]
Produced by: SkillSoft
An effective IS audit includes ensuring that an organizations processes for IS operations, maintenance, and service management supports and achieves the organizational strategic goals and objectives. This...
[READ MORE]
An effective IS audit includes ensuring that an organizations processes for IS operations, maintenance, and service management supports and achieves the organizational strategic goals and objectives. This course covers best practices for IS operations, including management practices, incident and problem management, and change management. IS hardware practices are also covered, including IT asset management, hardware components and architectures, and capacity management activities. Finally this course outlines best practices for IS architecture, software, network infrastructure and operations auditing activities. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
An effective IS audit includes ensuring that an organizations processes for IS operations, maintenance, and service management supports and achieves the organizational strategic goals and objectives. This course covers best practices for IS operations, including management practices, incident and problem management, and change management. IS hardware practices are also covered, including IT asset management, hardware components and architectures, and capacity management activities. Finally this course outlines best practices for IS architecture, software, network infrastructure and operations auditing activities. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
[READ LESS]
Produced by: SkillSoft
Two key components IS auditing professionals evaluate are an organizations IS management activities and logical access practices. This course covers key IS management elements, roles, responsibilities and...
[READ MORE]
Two key components IS auditing professionals evaluate are an organizations IS management activities and logical access practices. This course covers key IS management elements, roles, responsibilities and risk factors, as well as information security control design best practices. This course also outlines effective MAC and DAC controls, privacy principles, and external and third party IS best practices. Finally, this course covers key logical access best practices that IS auditors should evaluate, including exposures, identification and authentication controls, authorization issues, and confidential information handling activities. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
Two key components IS auditing professionals evaluate are an organizations IS management activities and logical access practices. This course covers key IS management elements, roles, responsibilities and risk factors, as well as information security control design best practices. This course also outlines effective MAC and DAC controls, privacy principles, and external and third party IS best practices. Finally, this course covers key logical access best practices that IS auditors should evaluate, including exposures, identification and authentication controls, authorization issues, and confidential information handling activities. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
[READ LESS]
Produced by: SkillSoft
IS audit professionals should understand and ensure that an organization's security policies, standards, procedures and controls are aligned and effectively protect the confidentiality, integrity, and...
[READ MORE]
IS audit professionals should understand and ensure that an organization's security policies, standards, procedures and controls are aligned and effectively protect the confidentiality, integrity, and availability of the organization's information assets. This course covers network infrastructure security including LAN, client-server, and wireless security, and best practices for auditing overall IS management frameworks. This course also outlines best practices for environmental and physical access controls, including mitigating risk from associated threats. Finally this course covers mobile, social, and cloud asset security best practices, and preventative measures against data leakage. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
IS audit professionals should understand and ensure that an organization's security policies, standards, procedures and controls are aligned and effectively protect the confidentiality, integrity, and availability of the organization's information assets. This course covers network infrastructure security including LAN, client-server, and wireless security, and best practices for auditing overall IS management frameworks. This course also outlines best practices for environmental and physical access controls, including mitigating risk from associated threats. Finally this course covers mobile, social, and cloud asset security best practices, and preventative measures against data leakage. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
[READ LESS]
Produced by: SkillSoft
Auditing information systems requires professionals to understand, and plan an effective auditing process. This course covers the audit function, including best practices for organizing, planning, and...
[READ MORE]
Auditing information systems requires professionals to understand, and plan an effective auditing process. This course covers the audit function, including best practices for organizing, planning, and resourcing audit activities. This course also covers industry-recognized audit and assurance standards, guidelines, and tools, as well as effective information systems controls frameworks including COBIT5 and risk analysis. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
Auditing information systems requires professionals to understand, and plan an effective auditing process. This course covers the audit function, including best practices for organizing, planning, and resourcing audit activities. This course also covers industry-recognized audit and assurance standards, guidelines, and tools, as well as effective information systems controls frameworks including COBIT5 and risk analysis. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
[READ LESS]
Produced by: SkillSoft
Auditing information systems requires more than a good plan; it requires effectively executing the audit plan, skill in assessing and reporting results, and anticipating necessary changes as the process...
[READ MORE]
Auditing information systems requires more than a good plan; it requires effectively executing the audit plan, skill in assessing and reporting results, and anticipating necessary changes as the process evolves. This course covers practical knowledge for performing an IS audit, as well as best practices for finalizing an audit, compiling results, and effectively communicating pertinent outcomes. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
Auditing information systems requires more than a good plan; it requires effectively executing the audit plan, skill in assessing and reporting results, and anticipating necessary changes as the process evolves. This course covers practical knowledge for performing an IS audit, as well as best practices for finalizing an audit, compiling results, and effectively communicating pertinent outcomes. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
[READ LESS]
Produced by: SkillSoft
Cisco Adaptive Security Appliance Context Aware Next-Generation Firewalls, or ASA (CX) NGFW provide context-aware security functionality on the Cisco ASA adaptive security appliance platform....
[READ MORE]
Cisco Adaptive Security Appliance Context Aware Next-Generation Firewalls, or ASA (CX) NGFW provide context-aware security functionality on the Cisco ASA adaptive security appliance platform. Context-awareness implies knowledge and control that are based on application (what), location (where), user-device type (how), and user identity (who). In this course you will learn key Cisco ASA (CX) NGFW functions, management architecture, and protocols as well as the basic Cisco Prime Security Manager (PRSM) GUI functions and Cisco ASA (CX) NGFW CLI operations. In addition, you'll learn the caveats of the Cisco (CX) NGFW management interface, and the Cisco (CX) NGFW and Cisco PRSM licensing requirements, as well as how to how to configure Cisco ASA (CX) NGFW policy objects. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
Cisco Adaptive Security Appliance Context Aware Next-Generation Firewalls, or ASA (CX) NGFW provide context-aware security functionality on the Cisco ASA adaptive security appliance platform. Context-awareness implies knowledge and control that are based on application (what), location (where), user-device type (how), and user identity (who). In this course you will learn key Cisco ASA (CX) NGFW functions, management architecture, and protocols as well as the basic Cisco Prime Security Manager (PRSM) GUI functions and Cisco ASA (CX) NGFW CLI operations. In addition, you'll learn the caveats of the Cisco (CX) NGFW management interface, and the Cisco (CX) NGFW and Cisco PRSM licensing requirements, as well as how to how to configure Cisco ASA (CX) NGFW policy objects. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
The Cisco Prime Security Manager (PRSM) includes a variety of dashboards with different reports to provide Cisco Adaptive Security Appliance Context Aware Next Generation Firewall, or ASA (CX) NGFW...
[READ MORE]
The Cisco Prime Security Manager (PRSM) includes a variety of dashboards with different reports to provide Cisco Adaptive Security Appliance Context Aware Next Generation Firewall, or ASA (CX) NGFW information about device health, performance, and network usage. In this course you will learn how to monitor the Cisco ASA (CX) NGFW, using the Cisco PRSM dashboards, reports, and event viewer and how to configure Cisco ASA (CX) NGFW access and identity policies. You'll also learn how to configure Cisco ASA (CX) NGFW decryption policies in order to detect and control what users are doing on the network. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
The Cisco Prime Security Manager (PRSM) includes a variety of dashboards with different reports to provide Cisco Adaptive Security Appliance Context Aware Next Generation Firewall, or ASA (CX) NGFW information about device health, performance, and network usage. In this course you will learn how to monitor the Cisco ASA (CX) NGFW, using the Cisco PRSM dashboards, reports, and event viewer and how to configure Cisco ASA (CX) NGFW access and identity policies. You'll also learn how to configure Cisco ASA (CX) NGFW decryption policies in order to detect and control what users are doing on the network. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
Web security threats have become more sophisticated, targeted, and harder to avoid, yet the use of personal devices and cloud-delivered services limit your visibility and control. Cisco Cloud Web Security...
[READ MORE]
Web security threats have become more sophisticated, targeted, and harder to avoid, yet the use of personal devices and cloud-delivered services limit your visibility and control. Cisco Cloud Web Security (CWS), formerly known as ScanSafe, delivers web security and control for organizations of all sizes, with multiple deployment options and tight integration into your Cisco data center, network, or branch office. In this course, you will learn how to deploy Cloud Web Security and redirect traffic to the cloud. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
Web security threats have become more sophisticated, targeted, and harder to avoid, yet the use of personal devices and cloud-delivered services limit your visibility and control. Cisco Cloud Web Security (CWS), formerly known as ScanSafe, delivers web security and control for organizations of all sizes, with multiple deployment options and tight integration into your Cisco data center, network, or branch office. In this course, you will learn how to deploy Cloud Web Security and redirect traffic to the cloud. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
Cisco E-mail Security Appliance (ESA) protects the e-mail infrastructure and employees who use e-mail at work by providing high-availability e-mail protection against the constant, dynamic, and rapidly...
[READ MORE]
Cisco E-mail Security Appliance (ESA) protects the e-mail infrastructure and employees who use e-mail at work by providing high-availability e-mail protection against the constant, dynamic, and rapidly changing threats affecting e-mail today. The appliance combines best-in-class technologies to prevent and respond to multilevel threats and integrates into existing e-mail infrastructures with a high degree of flexibility. In this course, you will learn about Cisco ESA services and the basic configuration components required to set up the Cisco ESA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
Cisco E-mail Security Appliance (ESA) protects the e-mail infrastructure and employees who use e-mail at work by providing high-availability e-mail protection against the constant, dynamic, and rapidly changing threats affecting e-mail today. The appliance combines best-in-class technologies to prevent and respond to multilevel threats and integrates into existing e-mail infrastructures with a high degree of flexibility. In this course, you will learn about Cisco ESA services and the basic configuration components required to set up the Cisco ESA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
Protecting your business assets is becoming more complicated as applications become more dynamic and as more users access enterprise and cloud-based resources from mobile devices. Cisco traditional and next...
[READ MORE]
Protecting your business assets is becoming more complicated as applications become more dynamic and as more users access enterprise and cloud-based resources from mobile devices. Cisco traditional and next generation Intrusion Prevention System (IPS) solutions can identify and mitigate attacks with market-leading, context-aware threat prevention that augments your firewall and VPN deployments. Cisco IPS devices intelligently determine the best response by looking at multiple factors, including the network reputation of an incoming flow's source, the target's value to the organization, the target's operating system, and the user identity associated with the flow. In this course you'll learn basic definitions and approaches to traditional intrusion prevention/detection systems and next generation IPS, including learning how to configure different Cisco IPS sensor interface modes and Cisco IPS. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
Protecting your business assets is becoming more complicated as applications become more dynamic and as more users access enterprise and cloud-based resources from mobile devices. Cisco traditional and next generation Intrusion Prevention System (IPS) solutions can identify and mitigate attacks with market-leading, context-aware threat prevention that augments your firewall and VPN deployments. Cisco IPS devices intelligently determine the best response by looking at multiple factors, including the network reputation of an incoming flow's source, the target's value to the organization, the target's operating system, and the user identity associated with the flow. In this course you'll learn basic definitions and approaches to traditional intrusion prevention/detection systems and next generation IPS, including learning how to configure different Cisco IPS sensor interface modes and Cisco IPS. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
The Cisco SensorBase correlates real-time data from more than 1.5 million devices around the world to create network reputation scores that enable Cisco IPS devices to block threats from known malicious hosts...
[READ MORE]
The Cisco SensorBase correlates real-time data from more than 1.5 million devices around the world to create network reputation scores that enable Cisco IPS devices to block threats from known malicious hosts before they pass through the IPS inspection process. In this course, you'll learn how to describe some methodologies for tuning a Cisco IPS sensor to properly manage false positive and negative events, including the methods and configuration procedures to create custom signatures on a Cisco IPS sensor. In addition, you'll learn how to enable the anomaly detection functionality and the reputation-based feature on the Cisco IPS sensor. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
The Cisco SensorBase correlates real-time data from more than 1.5 million devices around the world to create network reputation scores that enable Cisco IPS devices to block threats from known malicious hosts before they pass through the IPS inspection process. In this course, you'll learn how to describe some methodologies for tuning a Cisco IPS sensor to properly manage false positive and negative events, including the methods and configuration procedures to create custom signatures on a Cisco IPS sensor. In addition, you'll learn how to enable the anomaly detection functionality and the reputation-based feature on the Cisco IPS sensor. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
Determining how web traffic will be sent to the Cisco Web Security Appliance (WSA) is often perceived as the most challenging portion of the Cisco WSA integration, since it involves devices outside the WSA....
[READ MORE]
Determining how web traffic will be sent to the Cisco Web Security Appliance (WSA) is often perceived as the most challenging portion of the Cisco WSA integration, since it involves devices outside the WSA. In this course, you will learn Cisco WSA deployment approaches while exploring Cisco WSA key features and supported policies. You'll also learn how to configure identities and user authentication on the Cisco WSA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
Determining how web traffic will be sent to the Cisco Web Security Appliance (WSA) is often perceived as the most challenging portion of the Cisco WSA integration, since it involves devices outside the WSA. In this course, you will learn Cisco WSA deployment approaches while exploring Cisco WSA key features and supported policies. You'll also learn how to configure identities and user authentication on the Cisco WSA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
The Cisco ESA uses two different sets of mail policies for message content security allowing different security rules to be defined for messages sent to your users and messages sent from your users. In this...
[READ MORE]
The Cisco ESA uses two different sets of mail policies for message content security allowing different security rules to be defined for messages sent to your users and messages sent from your users. In this course, you will learn how to configure the different features within the incoming and outgoing mail policies; anti-spam, anti-virus, content filters, outbreak filters, and data loss prevention. You will also be able to describe the reporting functions and the tools used for troubleshooting the mail processing flows. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
The Cisco ESA uses two different sets of mail policies for message content security allowing different security rules to be defined for messages sent to your users and messages sent from your users. In this course, you will learn how to configure the different features within the incoming and outgoing mail policies; anti-spam, anti-virus, content filters, outbreak filters, and data loss prevention. You will also be able to describe the reporting functions and the tools used for troubleshooting the mail processing flows. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
Cisco Web Security Appliance (WSA) enables you to control user access based on the web server category of a particular HTTP or HTTPS request. Using access policy groups, you can create access policies that...
[READ MORE]
Cisco Web Security Appliance (WSA) enables you to control user access based on the web server category of a particular HTTP or HTTPS request. Using access policy groups, you can create access policies that control access to websites containing objectionable or questionable content. The sites that are blocked, allowed, or decrypted depend on the categories that you select when you set up URL category filtering within each policy group. In this course, you will learn acceptable use controls provided by the Cisco WSA and the anti-malware feature and its implementation on the Cisco WSA. You will also learn how to configure decryption policies on Cisco Web Security Appliance and the data security controls available on the Cisco WSA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
Cisco Web Security Appliance (WSA) enables you to control user access based on the web server category of a particular HTTP or HTTPS request. Using access policy groups, you can create access policies that control access to websites containing objectionable or questionable content. The sites that are blocked, allowed, or decrypted depend on the categories that you select when you set up URL category filtering within each policy group. In this course, you will learn acceptable use controls provided by the Cisco WSA and the anti-malware feature and its implementation on the Cisco WSA. You will also learn how to configure decryption policies on Cisco Web Security Appliance and the data security controls available on the Cisco WSA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
Information risk management and compliance is a pivotal part of the role of an information security manager. This course will provide an overview of information risk management and compliance, as well as...
[READ MORE]
Information risk management and compliance is a pivotal part of the role of an information security manager. This course will provide an overview of information risk management and compliance, as well as examine the elements that come into play when creating an information risk management plan and the frameworks and methodologies that are used. This course also examines risk assessment, with special attention to methods of risk identification, risk analysis, compliance, and the calculations used for risk impact analysis. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
Information risk management and compliance is a pivotal part of the role of an information security manager. This course will provide an overview of information risk management and compliance, as well as examine the elements that come into play when creating an information risk management plan and the frameworks and methodologies that are used. This course also examines risk assessment, with special attention to methods of risk identification, risk analysis, compliance, and the calculations used for risk impact analysis. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
Analysis, mitigation, and monitoring play an extremely important role in information risk management and compliance. This course examines how to properly classify and valuate information assets, perform a...
[READ MORE]
Analysis, mitigation, and monitoring play an extremely important role in information risk management and compliance. This course examines how to properly classify and valuate information assets, perform a business impact analysis, and the principles of disaster recovery. You will learn about the options available to deal with risk, effective controls, and ways to ensure your risk management program is integrated into your organization's other life-cycle processes. You will also examine the many responsibilities of an Information Security Manager related to risk monitoring and reporting. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
Analysis, mitigation, and monitoring play an extremely important role in information risk management and compliance. This course examines how to properly classify and valuate information assets, perform a business impact analysis, and the principles of disaster recovery. You will learn about the options available to deal with risk, effective controls, and ways to ensure your risk management program is integrated into your organization's other life-cycle processes. You will also examine the many responsibilities of an Information Security Manager related to risk monitoring and reporting. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
Information Security Governance is a major part of the job role of an Information Security Manager. The goal of information security governance is to establish and maintain a framework to provide assurance...
[READ MORE]
Information Security Governance is a major part of the job role of an Information Security Manager. The goal of information security governance is to establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations. This course looks at the role of information security governance in an organization, the need for senior management support for all policies and procedures that are put in place, the actual role the information security manager, and the core principles and metrics that are used at part of this process. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
Information Security Governance is a major part of the job role of an Information Security Manager. The goal of information security governance is to establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations. This course looks at the role of information security governance in an organization, the need for senior management support for all policies and procedures that are put in place, the actual role the information security manager, and the core principles and metrics that are used at part of this process. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
Many companies realize that their information security is not in the state that it should be. As an information security manager, it will be your role to guide your organization to where information-related...
[READ MORE]
Many companies realize that their information security is not in the state that it should be. As an information security manager, it will be your role to guide your organization to where information-related risks are controlled and sound information security processes are being followed by each and every employee. In order to move a company from a current state, to a desired state, there are many steps that must be taken. This course examines what an information security strategy is, frameworks and models you can use to build your strategy, who the strategy participants are, and constraints that may stand in your way. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
Many companies realize that their information security is not in the state that it should be. As an information security manager, it will be your role to guide your organization to where information-related risks are controlled and sound information security processes are being followed by each and every employee. In order to move a company from a current state, to a desired state, there are many steps that must be taken. This course examines what an information security strategy is, frameworks and models you can use to build your strategy, who the strategy participants are, and constraints that may stand in your way. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
In order for information security governance to succeed, there must be an action plan put into place to lay the groundwork for success. This course examines the assets, departments, resources, and people that...
[READ MORE]
In order for information security governance to succeed, there must be an action plan put into place to lay the groundwork for success. This course examines the assets, departments, resources, and people that play a role in bringing an action plan to life. This course will also examine the components and constraints of an action plan, along with providing a sample information security strategy to bring it all together. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
In order for information security governance to succeed, there must be an action plan put into place to lay the groundwork for success. This course examines the assets, departments, resources, and people that play a role in bringing an action plan to life. This course will also examine the components and constraints of an action plan, along with providing a sample information security strategy to bring it all together. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft