Filter by Topic
Filter by Vendor
ISO 31000 Lead Risk Manager
The ISO 31000 Lead Risk Manager training course helps participants …
What you'll learn
Demonstrate understanding of risk management principles, as formulated in ISO 31000
Establish, maintain, and continually improve a risk management framework, in accordance with ISO 31000 guidelines
Apply the risk management process, in accordance with ISO 31000 guidelines
Plan risk recording and reporting processes, as well as risk communication activities
Monitor, review, and improve the risk management framework and process based on the outcomes of risk management activities
ISO 22301 Lead Implementer
Disasters have various impacts in organizations. Disasters can result from …
What you'll learn
Explain the fundamental concepts and principles of a business continuity management system (BCMS) based on ISO 22301
Interpret the ISO 22301 requirements for a BCMS from the perspective of an implementer
Initiate and plan the implementation of a BCMS based on ISO 22301
Apply best practices to support the ongoing effectiveness and improvement of the BCMS based on ISO 22301
Interpret the requirements for an ISO 22301 certification audit
What you'll learn
Explain the fundamental concepts and principles of a business continuity management system (BCMS) based on ISO 22301
Interpret the ISO 22301 requirements for a BCMS from the perspective of an auditor
Evaluate the BCMS conformity to ISO 22301 requirements, in accordance with the fundamental audit concepts and principles
Plan, conduct, and close an ISO 22301 compliance audit, in accordance with ISO/IEC 17021-1 requirements, ISO 19011 guidelines, and other best practices of auditing
Manage an ISO 22301 audit program
What you'll learn
State an understanding of AWS cloud security based on the CIA triad.
Create and analyze authentication and authorizations with IAM.
Manage and provision accounts on AWS with appropriate AWS services.
Identify how to manage secrets using AWS services.
Monitor sensitive information and protect data via encryption and access controls.
Identify AWS services that address attacks from external sources.
Monitor, generate, and collect logs.
Identify indicators of security incidents.
Identify how to investigate threats and mitigate using AWS services.
Developing Generative AI Applications on AWS
This course is designed to introduce generative AI to software …
What you'll learn
Define the importance of generative AI and explain its potential risks and benefits
Identify business value from generative AI use cases
Discuss the technical foundations and key terminology for generative AI
Identify which prompt-techniques are best-suited for specific models
Identify potential prompt misuses
Describe architecture patterns that can be implemented with Amazon Bedrock for building generative AI applications , and more.
AWS Cloud Practitioner Essentials
This course is for individuals who seek an overall understanding …
What you'll learn
Summarize the working definition of AWS
Differentiate between on-premises, hybrid-cloud, and all-in cloud
Describe the basic global infrastructure of the AWS Cloud
Explain the six benefits of the AWS Cloud
Describe and provide an example of the core AWS services, including compute, network, databases, and storage
Identify an appropriate solution using AWS Cloud services with various use cases
Describe the AWS Well-Architected Framework
Explain the shared responsibility model
Describe the core security services within the AWS Cloud
Describe the basics of AWS Cloud migration
Articulate the financial benefits of the AWS Cloud for an organization’s cost management
Define the core billing, account management, and pricing models
Explain how to use pricing tools to make cost-effective choices for AWS services
AWS Cloud Essentials for Business Leaders
In this course, you will learn the fundamental concepts of …
What you'll learn
Explain the role of information technology (IT) in an organization for business transformation
Explain the customer value proposition for using the cloud across industries
Define key characteristics of cloud computing
Explain the cloud business model
Identify key security practices of cloud computing
Frame the cloud business value using the Cloud Value Framework