Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security response"
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cryptography, Cyber Security Assessment, Cyber Risk, Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Security Policies, Infrastructure Security, Security Awareness, Identity and Access Management
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Malware Protection, Vulnerability Assessments, Operating Systems, OS Process Management
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Data Integrity
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Data Lakes, Amazon DynamoDB, Amazon Web Services, Serverless Computing, Cloud Computing, Amazon S3, Scalability, Cloud Infrastructure, Amazon Elastic Compute Cloud, Event-Driven Programming, Cloud Security, Solution Architecture, Data Visualization, Cloud Computing Architecture, Cloud Solutions, Data Architecture, Amazon Redshift, Software Architecture
Skills you'll gain: Bash (Scripting Language), Linux Commands, Command-Line Interface, Operating Systems, SQL, Linux, Cybersecurity, Linux Administration, Databases, Computer Hardware, Relational Databases, File Systems, User Accounts
University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Usability Testing, Interaction Design, Human Factors, Information Privacy, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, Human Centered Design, Data Sharing, Design
Skills you'll gain: Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Security Awareness, Cyber Threat Intelligence, Malware Protection, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Security Strategy, Risk Management Framework, Security Controls, Enterprise Security, Information Privacy
Skills you'll gain: Node.JS, Cloud Computing Architecture, Server Side, Cloud-Native Computing, React Redux, Cloud Services, NoSQL, MongoDB, React.js, Agile Methodology, Front-End Web Development, JavaScript Frameworks, Cloud Security, Hypertext Markup Language (HTML), HTML and CSS, Cloud Infrastructure, Restful API, Web Development, Web Development Tools, Back-End Web Development
Palo Alto Networks
Skills you'll gain: Network Security, Cloud Security, Cyber Operations, DevSecOps, Cybersecurity, Cloud-Native Computing, Endpoint Detection and Response, Cyber Attacks, General Networking, TCP/IP, Zero Trust Network Access, Cryptography, Endpoint Security, Cyber Threat Intelligence, Malware Protection, Cloud Platforms, Firewall, Cloud Computing, Encryption, Security Information and Event Management (SIEM)
In summary, here are 10 of our most popular security response courses
- Cybersecurity and Its Ten Domains:Â Kennesaw State University
- Technical Deep Dive with Incident Response Tools:Â Infosec
- Introduction to Cyber Attacks:Â New York University
- Operating Systems: Overview, Administration, and Security:Â IBM
- AWS Cloud Solutions Architect:Â Amazon Web Services
- Tools of the Trade: Linux and SQL:Â Google
- Usable Security:Â University of Maryland, College Park
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University