Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "federal information security management act"
- Status: Free Trial
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), Angular, OAuth, Test Driven Development (TDD), Cryptography, Data Validation, Unit Testing, Vue.JS, Data Security, Authentications, HTML and CSS, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Web Applications, JavaScript Frameworks, Javascript, Security Strategy, Computer Programming
- Status: Free Trial
Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
- Status: Free Trial
Rutgers the State University of New Jersey
Skills you'll gain: Supplier Management, Procurement, Supplier Relationship Management, Supplier Performance Management, Vendor Management, Case Studies, Strategic Sourcing, Contract Management, Request For Quotation (RFQ), Risk Management, Supply Chain Management, Business Ethics, Performance Analysis, Operational Analysis
- Status: Free Trial
University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, TCP/IP, Network Analysis
- Status: Free Trial
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Security Controls, Virtual Private Networks (VPN), Firewall, Network Security, Data Access, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Authentications, User Accounts, Load Balancing, Encryption
- Status: New
Macquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Application Security, Key Management, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Data Integrity, Authentications, Hardware Architecture, Emerging Technologies
- Status: Preview
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), Automation, Event Monitoring, Cyber Threat Hunting, Continuous Monitoring, System Monitoring, Anomaly Detection, Cybersecurity, Data Analysis Software, Artificial Intelligence and Machine Learning (AI/ML)
- Status: New
Macquarie University
Skills you'll gain: Criminal Investigation and Forensics, Investigation, File Systems, Mobile Security, Cybersecurity, Data Security, Threat Detection, Data Integrity, Graphical Tools, Digital Communications, Malware Protection, File Management, Computer Security Incident Management, Incident Response, Mobile Development Tools, Data Storage, Real Time Data, Disaster Recovery, Network Analysis, Regulation and Legal Compliance
- Status: Free Trial
Illinois Tech
Skills you'll gain: Cloud Security, Identity and Access Management, AWS Identity and Access Management (IAM), Incident Response, Cloud Computing, Cloud Computing Architecture, Data Security, Application Security, Network Security, Encryption, Role-Based Access Control (RBAC), Amazon Web Services, Key Management, Infrastructure Security, Security Controls, Firewall, Continuous Monitoring, Multi-Factor Authentication
- Status: Free Trial
Skills you'll gain: Risk Analysis, Risk Management, Cybersecurity, Network Security, Incident Response, Cloud Security, Risk Management Framework, Authentications, Business Continuity Planning, Application Security, IT Management, Security Management, Threat Modeling, Threat Management, OSI Models, Disaster Recovery, Cryptography, Encryption, Cyber Risk, Vulnerability Assessments
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Game Theory, Data-Driven Decision-Making, Cybersecurity, Data Science, Algorithms, Reinforcement Learning, Machine Learning Algorithms, Applied Machine Learning, Machine Learning
- Status: Free Trial
Skills you'll gain: Blockchain, Threat Modeling, Application Security, Computer Security, Security Controls, Cybersecurity, Security Engineering, Data Security, Network Security, Information Systems Security, Cryptography, Vulnerability Assessments, Secure Coding, Cryptographic Protocols, Encryption, Key Management, Risk Management, Public Key Cryptography Standards (PKCS), Data Integrity, Distributed Computing
In summary, here are 10 of our most popular federal information security management act courses
- Web Technologies and Security:Â Codio
- Security Architecture and Engineering:Â Packt
- Supplier Management:Â Rutgers the State University of New Jersey
- Introduction to Computer Security:Â University of London
- Managing Security in Google Cloud:Â Google Cloud
- Cyber Security: Applied Cryptography:Â Macquarie University
- Automated Cyber Security Incident Response:Â EDUCBA
- Cyber Security: Digital Forensics:Â Macquarie University
- Cloud Computing Security - Master's:Â Illinois Tech
- Systems Security Certified Practitioner:Â Packt