scorecardresearch
Naukri Learning > information security

Refine Results

Course Level

Mode of learning

Category

IT & Telecom

Banking, Finance & Analytics

BPO, Operations & Engineering

Executive Programs

Leadership & Management

Marketing

Human Resources & Administration

Others

Masters Courses & MBA

Design

"information security" courses, certification and training

  1. Information Security: Context and Introduction

    In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. The course concludes with a discussion around a simple model of the information security industry and explores skills, knowledge and roles so that you can determine and analyse potential career opportunities in this developing profession and consider how you may need to develop personally to attain your career goals.

    14 hoursOnline self studyBeginner
    ₹ 3,516 Enquire Now

    Information Security, Network Security, Cyber Security,

    Offered by:  Coursera
  2. Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is a certification for information security managers awarded by ISACA, an international professional association focused on IT Governance. This CISM course has been designed specifically to offer candidates the best-in-the-industry training to play the role of an information security manager | Aimed at providing the requisite learning path for those preparing for the CISM certification, the course offers high-quality online learning content and study materials | The course covers a wide range of topics related to information security like security governance, risk management, compliance, program development and management, and incident management | Providing a career boost, the course follows the 2015 ISACA Candidate Information Guide and candidates will get a course completion certificate

    28 HoursOnline self studyIntermediate
    $ 251

    Information Security, , project management, Cloud Computing, Corporate Governance

    Offered by:  Skillsoft
  3. Intro to Information Security

    This course provides a one-semester overview of information security. It is designed to help students with prior computer and programming knowledge — both undergraduate and graduate — understand this important priority in society today. The technical content of the course gives a broad overview of essential concepts and methods for providing and evaluating security in information processing systems (operating systems and applications, networks, protocols, and so on). | In addition to its technical content, the course touches on the importance of management and administration, the place information security holds in overall business risk, social issues such as individual privacy, and the role of public policy.

    Online self studyIntermediate
    Enquire Now

    Information Security, Administration,

    Offered by:  UDACITY
  4. PG Certificate in Information and Cyber Security

    N L Dalmia Institute of Management Studies & Research offers the first of it’s kind in India –6 months post-graduation certificate in Information and Cyber Security | The course divided into three stages, gives the students a unique opportunity to develop their careers in ethical hacking and cyber security. The course is a perfect fit for students with a strong engineering/sciences background in computer sciences and information technology. The course would holistically cover everything right from the basics of penetration testing to cyber laws.

    Brochure
    Offered by:  N.L.Dalmia
  5. Cybersecurity Risk Management

    In this Cybersecurity Risk Management course, candidates get to pick up important principles like risk analysis, risk assessment and risk mitigation as a part of information security through qualitative methodology and quantitative practice. | This course makes it easy for candidates to identify information security related intimidations, susceptibility, gauge risk level, define controls and safeguard and conduct cost-benefit analysis or business impact analysis. The course covers general information on security risk management framework and related best practices. It also covers ways to identify and model information security risks. It also extends the quantitative framework hand-in-hand with data mining and machine learning approaches which are applicable in risk analytics driven by data. Participants can study the interconnected nuances of information security, big data and artificial intelligence. | This course helps candidates understanding risk framework as well as enables them to express business consequences of identified information security risks. | Lastly, this course inculcates skills in candidates to become successful information security professional.

    Offered by:  edX
  6. Financial Technologies (FinTech) for Leadership in the Digital World

    The financial world is going through an era of digital transformation. The impact of social media, mobility, Big Data and machine learning, Internet of Things, information security and blockchain, and artificial intelligence based robotics is being felt as firms strive to meet the expectations of the new-age millennial customers through digital mastery. Digital change management in the banking and financial services industry and capital markets needs new capabilities in leaders who have the vision to develop novel technological innovation for transforming the world of banking, trading, risk management, customer management and advisory, payments and fraud detection. This program aims to inspire leaders of firms with the required organizational and technological know- how for creating a novel digital vision for the financial organizations with measurable impact.

    Offered by:  IIM Calcutta
  7. CISSP (Online Classroom - Flexi Pass)

    Certified Information Systems Security Professional (CISSP) training facilitates the learning and knowledge in designing, building, and maintaining a secure business environment using globally approved Information Security standards. The aim of the course is to develop expertise in architecture, and design of security and earn the 30 CPEs required for the CISSP certification exam. IT Security professionals such as Security Consultants and Managers, IT Directors and Managers, and Security Auditors and Architects are best suited for this course enhancing their skills and knowledge on business continuity planning & disaster recovery planning vital for the smooth running of any organization

    5558 Students
    Offered by:  Simplilearn
  8. Certified Internet Security Auditor (CISA)

    The Certified Information Systems Auditor (CISA) credential demonstrates that the individual possesses a firm understanding of IS audit, control and security skills as set out in the five domains that the Information Systems Audit and Control Association (ISACA)group has created. The CISA credential it recognized worldwide as a high-level certification of proficiency in IS auditing. This learning path will aid learners to prepare for the Certified Information Systems Auditor (CISA) examination.

    Offered by:  Skillsoft
  9. Vskills Certified Cyber Security Analyst Government Certification

    This certification institutes & enhances awareness of aspirants as per the company need for cyber security and forensics. Knowledge acquired by the certification includes cybercrime, IT Act 2000, cyber offenses, wireless devices cybercrime, phishing, keyloggers, backdoors, SQL injection, DDoS attacks, identity theft, computer and wireless forensics, cyber terrorism, social media marketing, incident handling and privacy.

    100 hoursOffline self studyIntermediate
    $ 121

    Social media marketing, Cyber Security, Digital, Cloud Computing, Information Security, IPR, Law

    Offered by:  VSkills
  10. Certified Information Systems Security Professional (CISSP)

    The CISSP certification was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Standards Organization) Standard 17024:2003. It is approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories.

    10000 Students
    Offered by:  Koeing Solutions
  11. Cyber-Physical Systems Security

    This course provides an introduction to security issues relating to various cyber-physical systems including industrial control systems and those considered critical infrastructure systems.

    Offered by:  UDACITY
  12. IT Service Expert Program

    IT Service Expert Program is a certification course that would help you understand ITIL and how you can build specialized organisational capabilities to give superior services and deliver value to your customers. The Walt Disney Company, US Federal Government, IBM, WalMart and several other big businesses use ITIL. Understand how they have made the best use of ITIL and implement the principles to grow your organisation and yourself.

    Offered by:  Simplilearn
  13. Cloud Development Professional Training

    Cloud Development Professional is a 360° Training Program offered to professionals who want to deepen their knowledge and expertise in the field of AWS Cloud Computing. This program is updated regularly to comply with the latest industry standards, and is created and delivered by certified expert practitioners, with a passion for their craft. | This course is targeted towards professionals who desire to learn concepts and integrate skills relating to cloud computing and AWS into their work.

    120 HoursOnline ClassroomIntermediate
    $ 566 Enquire Now

    Cloud Computing, DevOps, Information Security

    Offered by:  Cognixia
  14. Certified Cloud Security Professional

    Cloud computing is for understanding cloud security, cloud system management and mitigation strategies. The course scouts aspects of cloud computing architectural design, cloud components, computing characteristics and cloud deployment models. Applicants will also learn problems relating to the management and protection of data assets held on cloud platform. Other topics covered in the course are auditing, legislative impact, ownership, data rights management, threat mitigation and so on. It is designed for information security professionals with three years of information security experience. A globally recognized certification in cloud security, It is perfect for those whose day to day responsibilities include managing cloud environments.

    Offered by:  Skillsoft
  15. Online M.Sc - IT

    A rigorous two-year (4semesters) program designed to prepare graduates for varied career opportunities in Information Technology. | From database management system, software engineering, networking fundamentals, object oriented programming, and data structure using C language to routing protocols& concepts, emerging technologies, and network planning & design – the course covers important concepts, practices, and trends in the subject area. | The course teaches various methodologies and life cycles involved in developing software applications and conducting scientific research. | The course provides high-quality academic and technical training in software, databases, and networking with deep focus on the mathematical and theoretical foundations of computing. | Given its scope, the program will benefit anybody (with a graduation degree) seeking to develop skills, improve competency, and build expertise in the subject.

    Offered by:  Amity Online University
Show Courses in Table
CompareRemove All
Browse Category
0

Buy Safely with Naukri.com
We support secure payment methods

Disclaimer

While Naukri Learning services have helped many customers over the years, we do not guarantee any interview calls or assure any job offers with any of our services.
The services associated with Naukri Learning are only provided through the website Naukri.com. You are advised to be cautious of calls/emails asking for payment from other web sites that claim to offer similar services under the name of Naukri.com. We have no associates/agents other than the partner sites that have been specifically named on the homepage of the website Naukri.com. We also recommend that you Security Guidelines and Terms and Conditions