Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "federal information security management act"
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Malware Protection, Cyber Security Assessment, Threat Detection, Penetration Testing, Threat Management, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Supervised Learning, Microsoft Windows
- Status: Free Trial
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
- Status: Free Trial
Fundação Instituto de Administração
Skills you'll gain: Interoperability, DevOps, Information Systems Security, Cybersecurity, Systems Integration, Application Programming Interface (API), Application Security, IT Security Architecture, Data Security, Web Services, Information Technology, Software As A Service, Microservices, Cloud Services, Cloud Computing
Universitat Autònoma de Barcelona
Skills you'll gain: Microsoft PowerPoint, Presentations, Microsoft Office, Productivity Software, Sales Presentations, Multimedia, Computer Literacy, Information Technology, Editing
- Status: NewStatus: Free Trial
Skills you'll gain: LLM Application, Databases, Data Storage Technologies, NoSQL, Data Storage, Query Languages, Artificial Intelligence, Database Architecture and Administration, Applied Machine Learning, Information Management, Generative AI
- Status: Free Trial
Skills you'll gain: Relational Databases, MySQL, Database Management Systems, Database Theory, SQL, Database Design, Databases, Query Languages, NoSQL, Data Integrity, Data Manipulation
- Status: Preview
Skills you'll gain: Linux Administration, Linux, Performance Tuning, Virtualization, Data Storage, Cloud Applications, Security Controls, Hardware Architecture, Artificial Intelligence
- Status: Free Trial
Skills you'll gain: Microsoft Azure, Virtual Machines, Kubernetes, Containerization, Cloud Storage, Cloud Computing, Data Storage, Cloud Applications, Application Deployment, Data Management, Infrastructure as Code (IaC), Application Security, Data Import/Export, Scalability
Google Cloud
Skills you'll gain: Kubernetes, Threat Modeling, Hardening, Security Testing, Verification And Validation, Google Cloud Platform, Security Controls, Vulnerability Assessments, Cloud Computing
- Status: Preview
Google Cloud
Skills you'll gain: Google Cloud Platform, Billing, Looker (Software), Billing Systems, Expense Management, Cloud Management, Accounting and Finance Software, Dashboard, Cost Management, User Accounts, Operating Cost, Google Sheets, Account Management, Resource Management, Identity and Access Management
- Status: New
Skills you'll gain: Disaster Recovery, Server Administration, Windows Servers, Servers, Network Troubleshooting, Linux Servers, Virtualization and Virtual Machines, Hardware Troubleshooting, Operating System Administration, Data Storage Technologies, IT Automation, Remote Access Systems, System Monitoring, Networking Hardware, Computer Hardware, Firewall, Data Security, Encryption
In summary, here are 10 of our most popular federal information security management act courses
- Certified Ethical Hacker (CEH): Unit 3: Pearson
- Advanced Malware and Network Anomaly Detection: Johns Hopkins University
- Assets, Threats, and Vulnerabilities: Google
- Integração e Cibersegurança entre os Sistemas de Informação: Fundação Instituto de Administração
- Competencias digitales de ofimática: Microsoft PowerPoint: Universitat Autònoma de Barcelona
- Vector Databases for RAG: An Introduction: IBM
- Introducción a las bases de datos: Meta
- Linux on LinuxONE: IBM
- AZ-104: Azure Storage, Compute, Containers, and Automation: Packt
- Hardening Default GKE Cluster Configurations: Google Cloud