Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security controls"
Skills you'll gain: Continuous Monitoring, NIST 800-53, Security Controls, Risk Management Framework, Authorization (Computing), Security Strategy, Security Management, Configuration Management, Cyber Risk, Change Control, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Cyber Security Assessment, Vulnerability Assessments
Skills you'll gain: Amazon Web Services, Disaster Recovery, Amazon Elastic Compute Cloud, Firewall, Network Security, AWS Identity and Access Management (IAM), Cloud Security, Infrastructure As A Service (IaaS), Amazon DynamoDB, Application Security, Cloud Solutions, Scalability, Security Controls, Network Troubleshooting, Amazon S3, Amazon CloudWatch, Network Administration, Virtual Private Networks (VPN), Continuous Deployment
- Status: [object Object]
Skills you'll gain: Quality Management, Project Scoping, Project Closure, Project Management, Project Management Life Cycle, Project Planning, Continuous Improvement Process, Agile Project Management, Project Controls, Quality Monitoring, Backlogs, Team Management, Project Documentation, Agile Methodology, Communication Planning, Project Risk Management, Change Management, Milestones (Project Management), Organizational Structure, Data Storytelling
Skills you'll gain: Network Security, Incident Response, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Configuration Management, Cybersecurity, Security Awareness, Security Management, Computer Security Incident Management, Cyber Attacks, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Security Information and Event Management (SIEM), Threat Modeling, Security Awareness
- Status: Free
Universiteit Leiden
Skills you'll gain: Risk Management, Safety and Security, Threat Management, Crisis Management, Public Safety and National Security, Cybersecurity, Analysis, Complex Problem Solving, International Relations, Governance, Political Sciences
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
Skills you'll gain: Cybersecurity, Encryption, Cyber Attacks, Email Security, Computer Security Awareness Training, Security Awareness, Data Security, Information Systems Security, Malware Protection, Authentications, Authorization (Computing), Security Controls, Hardening, Identity and Access Management, Multi-Factor Authentication, Browser Compatibility
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
- Status: [object Object]
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
In summary, here are 10 of our most popular security controls courses
- Advanced Risk Management, Security Controls & Monitoring:Â Packt
- AWS: Resilient Solutions and Security Controls:Â Whizlabs
- Google Project Management::Â Google
- Certified in Cybersecurity:Â ISC2
- Security Analyst Fundamentals:Â IBM
- Security & Safety Challenges in a Globalized World:Â Universiteit Leiden
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- Introduction to Cybersecurity Essentials:Â IBM
- Application Security for Developers and DevOps Professionals:Â IBM
- Computer Networks and Network Security:Â IBM