Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security best practices"
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Information and Event Management (SIEM), Security Awareness
Skills you'll gain: Data Storytelling, Requirements Elicitation, Business Process Modeling, Business Analysis, Data Presentation, Process Analysis, Resource Allocation, Data Visualization, Interactive Data Visualization, Stakeholder Management, Process Optimization, Business Requirements, Requirements Management, Data Modeling, Risk Analysis, Requirements Analysis, Excel Formulas, Microsoft Excel, Data Cleansing, Analysis
DeepLearning.AI
Skills you'll gain: Supervised Learning, Applied Machine Learning, Jupyter, Scikit Learn (Machine Learning Library), Machine Learning, NumPy, Predictive Modeling, Feature Engineering, Artificial Intelligence, Classification And Regression Tree (CART), Python Programming, Regression Analysis, Unsupervised Learning, Statistical Modeling, Data-Driven Decision-Making, Algorithms
University of Pennsylvania
Skills you'll gain: Financial Statements, Return On Investment, Financial Statement Analysis, Finance, Financial Reporting, Capital Budgeting, Financial Accounting, Financial Modeling, Working Capital, Balance Sheet, Accrual Accounting, Accounting, Cash Flows, Income Statement, Generally Accepted Accounting Principles (GAAP), Financial Analysis, Tax Planning, Equities, Financial Planning, Corporate Finance
Cisco Learning and Certifications
Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Information Systems Security, Cybersecurity, Network Security, Security Information and Event Management (SIEM), Network Monitoring, Information Assurance, Network Analysis, Intrusion Detection and Prevention, Event Monitoring, Data Capture, Data Integrity, Network Troubleshooting, Incident Response
Skills you'll gain: Open Web Application Security Project (OWASP), Istio, Software Development Life Cycle, Linux Commands, Unit Testing, Application Deployment, Kubernetes, NoSQL, Bash (Scripting Language), MongoDB, Shell Script, Django (Web Framework), Object-Relational Mapping, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Jupyter, Grafana
Skills you'll gain: System Configuration, Configuration Management, Cybersecurity, Security Awareness, Data Security, Security Controls, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Information Technology Operations, System Monitoring, Key Management, General Networking, Data Integrity
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Law, Regulation, and Compliance, Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Security, Cloud Infrastructure, Data Mining, Cloud Platforms, Cloud Computing, Artificial Intelligence, Generative AI, Data Ethics, OpenAI, Cloud Storage, Artificial Intelligence and Machine Learning (AI/ML), Infrastructure As A Service (IaaS), Big Data, Emerging Technologies, Data Analysis, Data Science, Deep Learning, Digital Transformation
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
- Status: Free
Universiteit Leiden
Skills you'll gain: Risk Management, Safety and Security, Threat Management, Crisis Management, Public Safety and National Security, Cybersecurity, Analysis, Complex Problem Solving, International Relations, Governance, Political Sciences
DeepLearning.AI
Skills you'll gain: Classification And Regression Tree (CART), Machine Learning Algorithms, Machine Learning, Data Ethics, Decision Tree Learning, Tensorflow, Supervised Learning, Deep Learning, Random Forest Algorithm, Artificial Neural Networks, Regression Analysis, Performance Tuning
In summary, here are 10 of our most popular security best practices courses
- Security Analyst Fundamentals:Â IBM
- IBM Business Analyst:Â IBM
- Supervised Machine Learning: Regression and Classification :Â DeepLearning.AI
- Introduction to Finance and Accounting:Â University of Pennsylvania
- Data Security:Â Cisco Learning and Certifications
- IBM Back-End Development:Â IBM
- Security Operations:Â ISC2
- Cybersecurity: Developing a Program for Your Business:Â Kennesaw State University
- Key Technologies for Business:Â IBM
- Security Concepts and Practices:Â ISC2