365Results for "Cybersecurity Law"
-
Cybersecurity Foundations: Governance, Risk, and Compliance (GRC)1h 56m
Cybersecurity Foundations: Governance, Risk, and Compliance (GRC)
By: AJ Yawn
Course
-
IT and Cybersecurity Risk Management Essential Training1h 52m
IT and Cybersecurity Risk Management Essential Training
By: Kip Boyle
Course
-
Cybersecurity laws and regulations3m
Cybersecurity laws and regulations
From: Transitioning to a Career in Cybersecurity
Video
-
Consider laws and regulations in cybersecurity governance4m
Consider laws and regulations in cybersecurity governance
From: Building and Auditing a Cybersecurity Program
Video
-
Cybersecurity laws and regulations, part 121m
Cybersecurity laws and regulations, part 1
From: Corporate Security Policies by Infosec
Video
-
Cybersecurity laws and regulations, part 215m
Cybersecurity laws and regulations, part 2
From: Corporate Security Policies by Infosec
Video
-
Regulations and laws2m
Regulations and laws
From: ISC2 Certified in Cybersecurity (CC) Cert Prep
Video
-
Regulations and laws2m
Regulations and laws
From: IAPP Certified Information Privacy Manager (CIPM) Cert Prep
Video
-
Compliance with laws and regulations2m
Compliance with laws and regulations
From: Program Management for Cybersecurity Managers: From Planning to Cross-Functional Coordination
Video
-
Cybersecurity Audit and Assessment Fundamentals for GRC Analysts: From Vendor Risk to Incident Coordination1h 21m
Cybersecurity Audit and Assessment Fundamentals for GRC Analysts: From Vendor Risk to Incident Coordination
By: AJ Yawn
Course
-
Compliance with laws and regulations4m
Compliance with laws and regulations
From: Building and Managing a Cybersecurity Program
Video
-
Cybersecurity Awareness: Cybersecurity Terminology48m
Cybersecurity Awareness: Cybersecurity Terminology
By: Lauren Zink
Course
-
Building and Auditing a Cybersecurity Program1h 52m
Building and Auditing a Cybersecurity Program
By: Michael Ratemo
Course
-
The Cybersecurity Threat Landscape1h 7m
The Cybersecurity Threat Landscape
By: Marc Menninger
Course
-
Overview of the recent cybersecurity and privacy regulations2m
Overview of the recent cybersecurity and privacy regulations
From: China's Cybersecurity and Privacy Regulations: Essential Training
Video
-
Introduction to law and regulation25m
Introduction to law and regulation
From: Corporate Security Policies by Infosec
Video
-
Regulation overview4m
Regulation overview
From: Cybersecurity Compliance and Regulatory Essentials for GRC Analysts
Video
-
IT Security Foundations: Core Concepts1h 52m
IT Security Foundations: Core Concepts
By: Lisa Bock
Course
-
Cybersecurity Law breakdown5m
Cybersecurity Law breakdown
From: China's Cybersecurity and Privacy Regulations: Essential Training
Video
-
China's Cybersecurity and Privacy Regulations: Essential Training1h 19m
China's Cybersecurity and Privacy Regulations: Essential Training
By: Mandy Huth
Course
-
Key provisions of the Data Security Law3m
Key provisions of the Data Security Law
From: China's Cybersecurity and Privacy Regulations: Essential Training
Video
-
Introduction to Security Information and Event Management (SIEM)1h 2m
Introduction to Security Information and Event Management (SIEM)
By: Fatimah Adelodun
Course
-
Introduction to external laws and rules8m
Introduction to external laws and rules
From: Corporate Security Policies by Infosec
Video
-
Building and Managing a Cybersecurity Program1h 44m
Building and Managing a Cybersecurity Program
By: Kip Boyle
Course
-
Cybersecurity Foundations: Security Architecture44m
Cybersecurity Foundations: Security Architecture
By: Pete Lindstrom
Course
-
Privacy laws and security3m
Privacy laws and security
From: Privacy, Governance, and Compliance: Data Classification and Inventory
Video
-
Lawfulness, fairness, and transparency1m
Lawfulness, fairness, and transparency
From: Privacy Fundamentals for Organizations
Video
-
Impact of laws and regulations3m
Impact of laws and regulations
From: ISO/IEC 42001:2023: Understanding and Implementing the Artificial Intelligence Management System (AIMS) Standard
Video
-
ISC2 Certified in Cybersecurity (CC) Cert Prep4h 57m
ISC2 Certified in Cybersecurity (CC) Cert Prep
By: Mike Chapple
Course
-
Understanding security laws and standards3m
Understanding security laws and standards
From: Certified Ethical Hacker (CEH)
Video
-
Contacting law enforcement3m
Contacting law enforcement
From: Cybersecurity: Key Policies and Resources
Video
-
Microsoft Cybersecurity Architect (SC-100) Cert Prep by Microsoft Press1h 51m
Microsoft Cybersecurity Architect (SC-100) Cert Prep by Microsoft Press
By: Charles Pluta and Microsoft Press
Course
-
Working with law enforcement4m
Working with law enforcement
From: Complete Guide to Incident Response for Security Analysts
Video
-
Data Security Law breakdown5m
Data Security Law breakdown
From: China's Cybersecurity and Privacy Regulations: Essential Training
Video
-
Certifications and codes of ethics3m
Certifications and codes of ethics
From: Ethics in Cybersecurity
Video
-
AI ethics: Cybersecurity and AI risks3m
AI ethics: Cybersecurity and AI risks
From: Using Generative AI Ethically at Work
Video
-
Accuracy, robustness, and cybersecurity3m
Accuracy, robustness, and cybersecurity
From: The EU AI Act for Developers and Technical Teams
Video
-
Applied Cybersecurity Ethics: Privacy, AI, and Emerging Threats54m
Applied Cybersecurity Ethics: Privacy, AI, and Emerging Threats
By: Jerod Brennen
Course
-
Accuracy, robustness, and cybersecurity3m
Accuracy, robustness, and cybersecurity
From: Navigating the EU AI Act
Video
-
Generative AI for Cyber Range and Training38m
Generative AI for Cyber Range and Training
By: Ian Khan
Course
-
NIST Cybersecurity Framework (CSF) 2.0 Primer: From Fundamentals to Implementation by Pearson3h 6m
NIST Cybersecurity Framework (CSF) 2.0 Primer: From Fundamentals to Implementation by Pearson
By: Pearson
Course
-
Practical Cybersecurity for IT Professionals2h 57m
Practical Cybersecurity for IT Professionals
By: Malcolm Shore
Course