-
All
-
Online
-
Filters
Security risk assessment courses
- Training
- Online
- Intermediate
- Different dates available
...A GDPR Assessment is a good way to ensure you have implemented GDPR correctly. Our GDPR courses cover all areas of the regulation from start to finish. Enforced on May 25th 2018 by the European Parliament and replaces The Data Protection... Learn about: Data Protection, Party risk, Data security...
- Course
- Online
- Intermediate
- 40h - 5 Days
...The CISSP certification is currently one of the most popular certification in the field of information security. This CISSP CBKv4 course trains you to become a broadly-skilled information security specialist. Upon completion of the course, you will have a solid knowledge of the 8 CISSP domains... Learn about: Security Manager, Identity and Access Management, Security Operations...
- Course
- Online
- Advanced
- 1 Day
... and any other applicable updates for 2016 and beyond. There are an enormous amount of issues and risks for covered entities and business associates these days. I will speak on specific experiences from over 17 years of experience in working as an outsourced compliance auditor as well as working directly with auditors... Learn about: Hipaa information security, Hipaa Audit online training, Hipaa audit requirements...
- Master
- Massachusetts (USA)
- Different dates available
- 9 Months
... Securities FIN-885 Enterprise Risk Management FIN-887 Fundamental Equity Analysis FIN-890 Risk Assessment and Simulation FIN-895 MSF Thesis FIN-900 Special... Learn about: Risk Assessment, Enterprise Risk Management, Financial Training...
- Training
- Online
- Intermediate
- Different dates available
...A GDPR Assessment is a good way to ensure you have implemented GDPR correctly. Our GDPR courses cover all areas of the regulation from start to finish. Enforced on May 25th 2018 by the European Parliament and replaces The Data Protection... Learn about: Data security, Business Risk, Party risk...
- Course
- (Ntb)
- Intermediate
- 5 Days
...The CISSP certification is currently one of the most popular certification in the field of information security. This CISSP CBKv4 course trains you to become a broadly-skilled information security specialist. Upon completion of the course, you will have a solid knowledge of the 8 CISSP domains... Learn about: Security Operations, Identity and Access Management, Communications and Network Security...
- Course
- Online
...Officially launched in 2002, the Management of Risk (M_o_R®) guide is intended to help organisations put in place an effective framework for risk management, helping decision making based on risks that affect strategic, programme, project and operational objectives. Who is the course designed... Learn about: Management of Risk, Risk Management, IT risk...
- MBA
- Massachusetts (USA)
- Different dates available
- 16 Months
... to help you earn the elite Financial Risk Manager (FRM) designation, valued by top employers across diverse businesses... Learn about: Portfolio Management, IT risk, Corporate Finance...
- Postgraduate
- London
...) Critical Security Methods: New frameworks for analysis (London: Routledge, 2014). Ulrich Beck, World at Risk (Cambridge: Polity, 2009). Judith Butler... Learn about: Conflict & Security, English Language, Human Rights...
- Course
- Online
- Intermediate
- Different dates available
... and the rise of zero day attacks rose more than 125% from 2014. Our InfoSec Professional program focuses on training, certifying, and producing skilled cyber security professionals that meet and exceed industry needs. The program entails a highly interactive curriculum with an emphasis on hands on learning... Learn about: Network security, Network Training, IT risk...
- Training
- Online
- Advanced
- 1h - 1 Day
... and implement Security Rule Policies and Procedures. Business Associate HIPAA Compliance Official's duties are a roadmap to develop, implement and maintain a Business Associate's HIPAA Compliance Program... Learn about: Hipaa risk assessment tool, Hipaa compliance training for business associates, Hipaa hitech...
- MBA
- Massachusetts (USA)
- Different dates available
- 16 Months
... Financial Analyst or Financial Risk Manager), this is an ideal program for your career goals... Learn about: Corporate Finance, Enterprise Risk Management, Risk Management...
- Master
- Oxford
...The programme offers short courses in more than 35 different subjects: from requirements engineering to object-oriented programming; from security principles to the management of risk and quality; from software engineering mathematics to database design. These courses may be used as credit towards... Learn about: Object oriented Programming, Software Engineering, Database training...
- Course
- London
- Different dates available
... roles in the workplace to manage fire risk (e.g. as fire wardens/marshals/stewards etc.) Course duration: One-day course Assessment method: Multiple... Learn about: Health Management, Fire Safety, Safety Management...
- Training
- Online
- Advanced
- 1h
... What is and is not a Breach Three exceptions - when an acquisition, access, use, or disclosure of PHI not permitted by the Privacy Rule is not a Breach How to perform a Breach Risk Assessment to determine if you can demonstrate a low probability that the PHI was compromised Who must be notified in... Learn about: Protected health information, Hipaa breach notification rule, Covered Entities and Business Associates...
- Master
- Massachusetts (USA)
- Different dates available
- 16 Months
... of Risk Professionals (GARP) Academic Partner... Learn about: Business Intelligence, Data Management, IT Auditing...
- PhD
- Currie
- Different dates available
... OverviewActuarial and Financial Mathematics is one of the main research areas within our Mathematical Sciences grouping. PhD opportunities are alighted with the research interests of our academic staff and are broadly as follows: Risk management Actuarial mathematics Finance & insurance interface Pension metrics... Learn about: Actuarial Mathematics, Financial Training, Financial Mathematics...
- Course
- Online
- Different dates available
...The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment... Learn about: IT Security, IT risk, Risk Assessment...
- Course
- San Francisco (USA)
- Different dates available
... techniques; Economic criteria: interest, hurdle rate, time value of money, selection, ranking criteria; Risk, uncertainty: types of risk, mathematical... Learn about: IT Development, Data Collection, Data Management...
- Course
- London
- Different dates available
... asbestos cement sheet roofing or cladding. Topics covered by this type of training include: • How to make suitable and sufficient assessments about the risk...