SPECIAL OFFERS
Keep up with new releases and promotions. Sign up to hear from us.
Home > Topics > Certification > Other IT
Published Mar 22, 2024 by Cisco Press
Published Mar 14, 2024 by Addison-Wesley Professional
Published Feb 16, 2024 by Addison-Wesley Professional
Published Nov 27, 2023 by Pearson IT Certification
Modern organizations rely on specialists to keep cyber criminals at bay. How can you demonstrate that you have the necessary skills to gain a desirable job in a security-related position? Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, explains the value of achieving the Cisco SCYBER certification, which is designed around responding to cyber attacks.
In this video excerpt from Oracle Certified Associate, Java SE 7 Programmer Exam (1Z0-803) Complete Video Course, Java instructor, architect, and programmer Simon Roberts introduces the course, what he covers in the course, how the course is structured, and his teaching approach.
This chapter explains how to manage information security policies, describes roles and responsibilities related to information security, identifies the components of risk management, and shows how to create polices related to information security policy, governance, and risk management.
This chapter introduces the trusted computer base and the ways in which systems can be evaluated to assess the level of security to help you prepare for the CISSP exam.