Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "information security training"
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cryptography, Cyber Security Assessment, Cyber Risk, Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Security Policies, Infrastructure Security, Security Awareness, Identity and Access Management
University of California, Irvine
Skills you'll gain: Systems Development Life Cycle, Agile Methodology, Productivity Software, Network Security, Computer Hardware, Hardware Architecture, Computer Systems, Data Security, Systems Design, Systems Development, Risk Management, System Design and Implementation, TCP/IP, Information Technology, Software Development Methodologies, Networking Hardware, Data Ethics, Cybersecurity, General Networking, Safety and Security
Skills you'll gain: Cloud Computing Architecture, Peripheral Devices, Cloud Services, Cybersecurity, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Cloud Platforms, Encryption, Data Storage, Cyber Attacks, Software Development Life Cycle, Networking Hardware, Application Development, Information Technology, Cloud Computing, Databases, Computer Hardware, Computer Systems
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Presentation, Data Governance, Data Security, Data Migration, Database Design, Data Visualization, Interactive Data Visualization, Descriptive Statistics, Data Mining, Cloud Storage, Data Visualization Software, Extract, Transform, Load, IBM DB2, Data Management, MySQL, Excel Formulas
Skills you'll gain: Data Mining, Artificial Intelligence, Generative AI, Data Ethics, OpenAI, Artificial Intelligence and Machine Learning (AI/ML), Big Data, Information Architecture, Strategic Decision-Making, Cloud Computing, Data Analysis, Data Science, Deep Learning, Digital Transformation, Data Strategy, Data-Driven Decision-Making, Artificial Neural Networks, Business Strategy, Business Process Automation, ChatGPT
Skills you'll gain: SQL, Web Scraping, Database Design, MySQL, Data Transformation, Extract, Transform, Load, IBM DB2, Relational Databases, Data Architecture, Jupyter, Data Pipelines, Big Data, Database Management, Data Warehousing, Data Governance, Databases, Stored Procedure, Data Manipulation, Automation, Python Programming
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Penetration Testing, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Personally Identifiable Information, Identity and Access Management, Web Applications, Data Validation
Skills you'll gain: Incident Response, IT Security Architecture, Identity and Access Management, Continuous Monitoring, Network Security, Security Awareness, Information Systems Security, Security Information and Event Management (SIEM), Application Security, Disaster Recovery, Security Controls, Cloud Security, Cyber Security Strategy, Threat Detection, Cyber Governance, Risk Management Framework, Authentications
University of California, Irvine
Skills you'll gain: Vendor Management, Security Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Security Controls, Human Factors (Security), Asset Protection, Due Diligence
Skills you'll gain: Threat Modeling, IT Security Architecture, Secure Coding, Application Security, Security Testing, Security Strategy, Information Systems Security, Security Engineering, Software Development Methodologies, Software Development Life Cycle, Systems Architecture, Cyber Security Strategy, Software Testing, Development Testing, Penetration Testing, Business Risk Management, Compliance Management
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
Skills you'll gain: Regulatory Compliance, Data Management, Healthcare Industry Knowledge, Health Information Management and Medical Records, Health Care, Data Security, Security Management, Personally Identifiable Information, Information Privacy, Electronic Medical Record, Data Sharing, Cybersecurity, Threat Management, Emerging Technologies
In summary, here are 10 of our most popular information security training courses
- Cybersecurity and Its Ten Domains:Â Kennesaw State University
- Introduction to Computer Information Systems:Â University of California, Irvine
- Information Technology (IT) and Cloud Fundamentals:Â IBM
- IBM Data Management:Â IBM
- IBM AI Foundations for Business:Â IBM
- Data Engineering Foundations:Â IBM
- Identifying Security Vulnerabilities:Â University of California, Davis
- Managing Information System Security Architecture:Â LearnQuest
- Personnel & Third-Party Security:Â University of California, Irvine
- Designing Robust Information System Security Architectures:Â LearnQuest