Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security tools and technologies"
University of Michigan
Skills you'll gain: Negotiation, Contract Negotiation, Conflict Management, Communication, Contract Management, Interpersonal Communications, Influencing, Planning, Decision Making, Cultural Sensitivity, Industrial and Organizational Psychology
- Status: Free
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Computer Security Awareness Training, Threat Detection, General Networking, Vulnerability
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Visualization, Statistical Programming, Ggplot2, Dimensionality Reduction, Data Visualization Software, Data Integration, Knitr, Data Analysis, Data Import/Export, General Science and Research, Data Sharing, Statistical Reporting
- Status: Free
Stanford University
Skills you'll gain: Cooking, Preventative Care, Food and Beverage, Behavioral Health, Socioeconomics, Education and Training, Culture, Environmental Issue
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Security, Cloud Infrastructure, Data Mining, Cloud Platforms, Cloud Computing, Artificial Intelligence, Generative AI, OpenAI, Cloud Storage, Infrastructure As A Service (IaaS), Big Data, Emerging Technologies, Data Analysis, Data Science, Deep Learning, Digital Transformation, Artificial Neural Networks, ChatGPT
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
University of Michigan
Skills you'll gain: Talent Management, Team Motivation, Team Building, Teamwork, Team Management, Talent Pipelining, Influencing, Team Leadership, People Development, Motivational Skills, Employee Onboarding, Employee Performance Management, Employee Coaching, Employee Engagement, Interviewing Skills, Persuasive Communication, Leadership, Professional Networking, Business Leadership, Leadership Development
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Systems Development Life Cycle, Information Assurance, Internal Controls, Information Systems Security, Compliance Auditing, Risk Management, Security Controls, Change Management, System Implementation, System Monitoring, Risk Analysis, Risk Mitigation, Software Development
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Record Keeping, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
- Status: AI skills
Google Cloud
Skills you'll gain: Cloud Security, Identity and Access Management, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Management, Cyber Threat Hunting, Risk Management Framework, Cyber Operations, Vulnerability Management, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Generative AI, DevSecOps, Cloud Computing, Data Security, Google Cloud Platform, Cybersecurity
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
University of California, Irvine
Skills you'll gain: Cost Estimation, Stakeholder Management, Project Risk Management, Project Schedules, Work Breakdown Structure, Project Performance, Estimation, Conflict Management, Risk Analysis, Quality Management, Project Management, Timelines, Milestones (Project Management), Cost Management, Project Planning, Peer Review, Budgeting, Project Management Life Cycle, Scope Management, Change Management
In summary, here are 10 of our most popular security tools and technologies courses
- Successful Negotiation: Essential Strategies and Skills: University of Michigan
- Cybersecurity for Everyone: University of Maryland, College Park
- Data Science: Foundations using R: Johns Hopkins University
- Stanford Introduction to Food and Health: Stanford University
- Key Technologies for Business: IBM
- ISC2 Systems Security Certified Practitioner (SSCP): ISC2
- Leading People and Teams: University of Michigan
- Information Systems Auditing, Controls and Assurance: The Hong Kong University of Science and Technology
- Sound the Alarm: Detection and Response: Google
- Google Cloud Cybersecurity: Google Cloud