Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "federal information security management act"
- Status: New AI skills
Google
Skills you'll gain: Threat Modeling, Network Security, Threat Management, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Attacks, Cybersecurity, Network Protocols, Cloud Security, Vulnerability Assessments, Threat Detection, Bash (Scripting Language), Operating Systems, Security Controls, Debugging, Python Programming
Skills you'll gain: Identity and Access Management, IT Security Architecture, Authentications, Business Continuity Planning, Continuous Monitoring, Security Controls, Secure Coding, Security Testing, Cryptography, Disaster Recovery, Vulnerability Assessments, Cyber Security Assessment, Incident Response, Application Security, Incident Management, Security Engineering, Data Security, Network Security, OSI Models, Data Loss Prevention
Skills you'll gain: IT Service Management, Cloud Computing, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Computer Security Incident Management, Cloud Security, Operating Systems, Endpoint Detection and Response, Cyber Risk, Data Ethics, Cyber Governance
Skills you'll gain: Network Security, Information Systems Security, Cybersecurity, Encryption, Cyber Attacks, Security Awareness, Data Security, Threat Modeling, Security Management, Security Strategy, Computer Security Awareness Training, Information Assurance, Wireless Networks, Firewall, Malware Protection, Authentications, Authorization (Computing), Technical Support
- Status: New AI skills
Skills you'll gain: Quality Management, Project Management Life Cycle, Project Scoping, Project Closure, Project Management, Project Planning, Continuous Improvement Process, Agile Project Management, Project Controls, Backlogs, Quality Assessment, Team Management, Project Documentation, Agile Methodology, Communication Planning, Project Schedules, Change Management, Milestones (Project Management), Organizational Structure, Data Storytelling
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Audit Planning, Systems Development Life Cycle, Software Development Life Cycle, Auditing, Information Assurance, Internal Controls, Information Systems Security, Compliance Auditing, Risk Management, Security Controls, Change Management, System Implementation, Risk Analysis
Kennesaw State University
Skills you'll gain: Network Security, Incident Response, Network Administration, Vulnerability Management, Cybersecurity, Contingency Planning, Cyber Governance, Cyber Attacks, Disaster Recovery, Computer Security Incident Management, Cyber Security Policies, Security Management, Firewall, Network Monitoring, General Networking, Cyber Security Strategy, Crisis Management, Vulnerability Assessments, Cyber Security Assessment, Risk Management
Skills you'll gain: MySQL, Database Design, Version Control, Database Management Systems, Database Management, MySQL Workbench, Extract, Transform, Load, Data Modeling, Data Structures, SQL, Unix Commands, Relational Databases, Databases, Git (Version Control System), Database Systems, Stored Procedure, Object Oriented Programming (OOP), Unit Testing, Algorithms, Django (Web Framework)
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Security Management, Intelligence Collection and Analysis, International Relations, Public Safety and National Security, Safety and Security, Risk Management, Cybersecurity, Governance, Cultural Diversity, Economics, Policy, and Social Studies
University of Minnesota
Skills you'll gain: Enterprise Resource Planning, Business Systems Analysis, Systems Analysis, Requirements Analysis, Cybersecurity, Business Requirements, Business Systems, Cloud Computing, Cloud Services, IT Management, Change Management, Information Technology, Organizational Change, Technology Strategies, Process Flow Diagrams, System Implementation, User Requirements Documents, Data Modeling, Enterprise Architecture, Portfolio Management
Skills you'll gain: Threat Management, Cybersecurity, Risk Management Framework, Risk Management, Business Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Open Web Application Security Project (OWASP), Auditing
In summary, here are 10 of our most popular federal information security management act courses
- Google Cybersecurity: Google
- CISSP Certified Information Systems Security Professional: Packt
- IT Fundamentals for Cybersecurity: IBM
- IT Security: Defense against the digital dark arts : Google
- Google Project Management:: Google
- Information Systems Auditing, Controls and Assurance: The Hong Kong University of Science and Technology
- Managing Cybersecurity: Kennesaw State University
- Meta Database Engineer: Meta
- IBM Cybersecurity Analyst: IBM
- International Security Management: Erasmus University Rotterdam