Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "federal information security management act"
- Status: NewStatus: Free Trial
Packt
Skills you'll gain: Backlogs, Product Roadmaps, Sprint Planning, Agile Methodology, Product Management, AI Product Strategy, Wireframing, A/B Testing, Agile Product Development, Project Estimation, Microsoft Teams, Product Strategy, Product Planning, Jira (Software), Product Requirements, Estimation, Project Management, Agile Project Management, ChatGPT, Kanban Principles
- Status: Free Trial
Rutgers the State University of New Jersey
Skills you'll gain: Supplier Management, Procurement, Supplier Relationship Management, Supplier Performance Management, Vendor Management, Case Studies, Strategic Sourcing, Contract Management, Request For Quotation (RFQ), Risk Management, Supply Chain Management, Business Ethics, Performance Analysis, Operational Analysis
- Status: Free Trial
Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
- Status: Free Trial
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), Angular, OAuth, Test Driven Development (TDD), Cryptography, Data Validation, Unit Testing, Vue.JS, Data Security, Authentications, HTML and CSS, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Web Applications, JavaScript Frameworks, Javascript, Security Strategy, Computer Programming
- Status: Free Trial
Skills you'll gain: Risk Analysis, Risk Management, Cybersecurity, Network Security, Incident Response, Cloud Security, Risk Management Framework, Authentications, Business Continuity Planning, Application Security, IT Management, Security Management, Threat Modeling, Threat Management, OSI Models, Disaster Recovery, Cryptography, Encryption, Cyber Risk, Vulnerability Assessments
- Status: Free Trial
University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, TCP/IP, Network Analysis
- Status: Free Trial
Skills you'll gain: Blockchain, Threat Modeling, Application Security, Computer Security, Security Controls, Cybersecurity, Security Engineering, Data Security, Network Security, Information Systems Security, Cryptography, Vulnerability Assessments, Secure Coding, Cryptographic Protocols, Encryption, Key Management, Risk Management, Public Key Cryptography Standards (PKCS), Data Integrity, Distributed Computing
- Status: New
Macquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Application Security, Key Management, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Data Integrity, Authentications, Hardware Architecture, Emerging Technologies
- Status: New
Macquarie University
Skills you'll gain: Criminal Investigation and Forensics, Investigation, File Systems, Mobile Security, Cybersecurity, Data Security, Threat Detection, Data Integrity, Graphical Tools, Digital Communications, Malware Protection, File Management, Computer Security Incident Management, Incident Response, Mobile Development Tools, Data Storage, Real Time Data, Disaster Recovery, Network Analysis, Regulation and Legal Compliance
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Game Theory, Data-Driven Decision-Making, Cybersecurity, Data Science, Algorithms, Reinforcement Learning, Machine Learning Algorithms, Applied Machine Learning, Machine Learning
- Status: Free Trial
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Security Controls, Virtual Private Networks (VPN), Firewall, Network Security, Data Access, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Authentications, User Accounts, Load Balancing, Encryption
- Status: Preview
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), Automation, Event Monitoring, Cyber Threat Hunting, Continuous Monitoring, System Monitoring, Anomaly Detection, Cybersecurity, Data Analysis Software, Artificial Intelligence and Machine Learning (AI/ML)
In summary, here are 10 of our most popular federal information security management act courses
- Product Management: Packt
- Supplier Management: Rutgers the State University of New Jersey
- Security Architecture and Engineering: Packt
- Web Technologies and Security: Codio
- Systems Security Certified Practitioner: Packt
- Introduction to Computer Security: University of London
- Blockchain Security - Foundational Concepts: LearnQuest
- Cyber Security: Applied Cryptography: Macquarie University
- Cyber Security: Digital Forensics: Macquarie University
- Data Science Decisions in Time: Information Theory & Games: Johns Hopkins University