Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "it security fundamentals"
Skills you'll gain: Software Development Life Cycle, Linux Commands, Unit Testing, Bash (Scripting Language), Shell Script, Git (Version Control System), GitHub, Development Environment, Version Control, File Management, Jupyter, Software Engineering, Software Architecture, Application Deployment, Automation, Flask (Web Framework), Web Scraping, Python Programming, Open Source Technology, Application Development
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, IT Security Architecture, Application Security, Infrastructure Security, Cryptography, Regulation and Legal Compliance, Bash (Scripting Language), Encryption, Authorization (Computing), Risk Management, Virtualization
Skills you'll gain: Cloud Computing Architecture, Peripheral Devices, Technical Support, Cloud Services, Cybersecurity, Computing Platforms, Hardware Troubleshooting, IT Service Management, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Desktop Support, Encryption, Data Storage, Software Development Life Cycle, Professional Networking, Information Technology, Cloud Computing, Interviewing Skills, Computer Hardware
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Penetration Testing, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Personally Identifiable Information, Identity and Access Management, Web Applications, Data Validation
Skills you'll gain: Continuous Monitoring, Business Continuity, ISO/IEC 27001, Security Management, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
University of Minnesota
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cloud Computing, Cloud Services, IT Management, Information Technology, Technology Solutions, Technology Strategies, IT Infrastructure, Data Security, Information Systems, Emerging Technologies, Innovation, Business Transformation, Blockchain, Virtualization
Palo Alto Networks
Skills you'll gain: Cyber Operations, Endpoint Detection and Response, Endpoint Security, Security Information and Event Management (SIEM), Zero Trust Network Access, Cybersecurity, Cyber Threat Intelligence, Threat Modeling, Continuous Monitoring, Security Controls, IT Security Architecture, Threat Detection, Incident Response, Malware Protection, Automation, Authentications, Data Lakes
Skills you'll gain: Security Controls, Information Assurance, Cybersecurity, Risk Management Framework, Information Systems Security, Security Awareness, Cyber Governance, Security Management, Cyber Security Policies, Cyber Risk, Data Ethics, Data Integrity
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Secure Coding, Application Security, Identity and Access Management, Information Systems Security Assessment Framework (ISSAF), Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Systems Architecture, Security Strategy, Security Engineering, Zero Trust Network Access, Security Awareness, Security Information and Event Management (SIEM), Risk Management Framework, Disaster Recovery, Security Requirements Analysis
In summary, here are 10 of our most popular it security fundamentals courses
- Applied Software Engineering Fundamentals:Â IBM
- Security Concepts and Practices:Â ISC2
- Cyber Security Technologies:Â Illinois Tech
- IBM IT Support:Â IBM
- Identifying Security Vulnerabilities:Â University of California, Davis
- Security and Risk Management:Â Packt
- IT Infrastructure and Emerging Trends:Â University of Minnesota
- Palo Alto Networks Security Operations Fundamentals:Â Palo Alto Networks
- Security Principles:Â ISC2
- Operating Systems: Overview, Administration, and Security:Â IBM