Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "federal information security management act"
- Status: Preview
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Google Cloud
Skills you'll gain: Vulnerability Scanning, Google App Engine, Vulnerability Assessments, Application Security, Cloud Security, Google Cloud Platform
- Status: New
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Incident Response, Cloud Security, Intrusion Detection and Prevention, Microsoft Azure, Security Information and Event Management (SIEM), Malware Protection, Endpoint Security, Azure Active Directory, Anomaly Detection, Email Security, Identity and Access Management, Automation
- Status: NewStatus: Free Trial
Skills you'll gain: Cybersecurity, Application Security, Data Security, Cryptography, Authentications, Data Structures, Data Integrity, Artificial Intelligence
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Public Key Infrastructure, Continuous Monitoring, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
- Status: NewStatus: Free Trial
Skills you'll gain: Google Cloud Platform, Cost Management, Cloud Management, System Monitoring, Application Performance Management, Cloud Security, Identity and Access Management, Key Management, Infrastructure as Code (IaC), Continuous Monitoring, Encryption, Serverless Computing, Event-Driven Programming, Real Time Data
- Status: NewStatus: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Vulnerability Management, Security Information and Event Management (SIEM), Cyber Operations, Event Monitoring, Cyber Threat Hunting, Intrusion Detection and Prevention, Cyber Threat Intelligence, Enterprise Security, Threat Detection, Data Loss Prevention, Security Controls, Network Security, Network Monitoring
- Status: NewStatus: Free Trial
Skills you'll gain: Application Deployment, Open Web Application Security Project (OWASP), CI/CD, Docker (Software), Bash (Scripting Language), Cloud Development, DevOps, Containerization, IT Automation, Cloud Hosting, Load Balancing, Ansible, Infrastructure As A Service (IaaS), Secure Coding, Application Security, Firewall, Servers, Unit Testing
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Internet Of Things, Real-Time Operating Systems, General Networking, Wireless Networks, Information Systems Security, IBM Cloud, Petroleum Industry, Automation, Network Protocols, Emerging Technologies, Cloud Platforms, Network Infrastructure, Embedded Systems, Market Analysis, Interviewing Skills, Software-Defined Networking
- Status: Preview
University of Michigan
Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, Computer Networking, Encryption, Network Infrastructure, Innovation, Hypertext Markup Language (HTML)
- Status: Free Trial
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Data Storage Technologies, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Encryption, Key Management, Virtual Machines
- Status: Free Trial
University of Illinois Urbana-Champaign
Skills you'll gain: Management Accounting, Operations Management, Marketing, Process Improvement, Organizational Strategy, Performance Measurement, Marketing Planning, Supply Chain, Supply Chain Management, Product Strategy, Manufacturing Operations, Operational Analysis, Business Operations, Branding, Integrated Marketing Communications, Strategic Marketing, Marketing Strategy and Techniques, Variance Analysis, Cost Accounting, Quality Control
In summary, here are 10 of our most popular federal information security management act courses
- In the Trenches: Security Operations Center : EC-Council
- Cloud Security Scanner: Qwik Start: Google Cloud
- SC-200 Microsoft Security Operations Analyst: Packt
- Cyber Security Hashing Training for Beginners: Simplilearn
- ISC2 Systems Security Certified Practitioner (SSCP): ISC2
- GCP: Monitoring, Security, and Costs: Whizlabs
- Into the Trenches: Security Operations Center : EC-Council
- App Deployment, Security & Infrastructure Automation: Packt
- Industrial IoT Markets and Security: University of Colorado Boulder
- Internet History, Technology, and Security: University of Michigan