Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "identify security challenges"
Skills you'll gain: Cloud Computing Architecture, Peripheral Devices, Cloud Services, Cybersecurity, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Cloud Platforms, Encryption, Data Storage, Cyber Attacks, Software Development Life Cycle, Networking Hardware, Application Development, Information Technology, Cloud Computing, Databases, Computer Hardware, Computer Systems
Skills you'll gain: Cybersecurity, Business Continuity, Threat Detection, Endpoint Security, Disaster Recovery, Cyber Security Policies, Vulnerability Assessments, Network Security, Governance Risk Management and Compliance, Continuous Monitoring, Cloud Security, Risk Management
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Application Security, Vulnerability Assessments, Vulnerability Management, Event Monitoring, Security Controls, Data Integrity, Patch Management, Network Security
DeepLearning.AI
Skills you'll gain: Tensorflow, Computer Vision, Image Analysis, Keras (Neural Network Library), Natural Language Processing, Time Series Analysis and Forecasting, Deep Learning, Applied Machine Learning, Predictive Modeling, Artificial Intelligence and Machine Learning (AI/ML), Artificial Neural Networks, Text Mining, Forecasting, Machine Learning, Supervised Learning, Data Processing, Data Transformation
Cisco Learning and Certifications
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cyber Threat Intelligence, Threat Detection, General Networking, Network Security, Cybersecurity, Cyber Security Policies, Infrastructure Security, Computer Networking, Technical Services, Technical Support and Services
University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Cyber Governance, Cyber Risk, Security Strategy, Cyber Security Policies, Security Management, Security Awareness, Personally Identifiable Information, Threat Modeling, Information Privacy, Infrastructure Security, Risk Management, Vulnerability Assessments
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Information Systems Security, Computer Security Awareness Training, Risk Management, Vulnerability Assessments, Enterprise Security, Cyber Security Assessment
Skills you'll gain: Social Media Marketing, Social Media, Target Audience, Social Media Strategy, Social Media Management, Marketing, Key Performance Indicators (KPIs), Goal Setting, Facebook, Marketing Strategies, Marketing Channel, Policy Development, Instagram, Digital Marketing
Skills you'll gain: System Configuration, Configuration Management, Cybersecurity, Security Awareness, Data Security, Security Controls, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Information Technology Operations, System Monitoring, Key Management, General Networking, Data Integrity
Duke University
Skills you'll gain: Presentations, Data Storytelling, Data Presentation, Database Design, MySQL, Relational Databases, SQL, Data Visualization, Business Analytics, Business Metrics, Data Visualization Software, Business Process Improvement, Business Intelligence, Tableau Software, Financial Modeling, Microsoft Excel, Excel Formulas, Business Process, Probability Distribution, Business Risk Management
Skills you'll gain: Network Security, Incident Response, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Configuration Management, Cybersecurity, Security Awareness, Security Management, Computer Security Incident Management, Cyber Attacks, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)
University of California, Irvine
Skills you'll gain: Grammar
In summary, here are 10 of our most popular identify security challenges courses
- Information Technology (IT) and Cloud Fundamentals:Â IBM
- Office of the CISO Institute: Cybersecurity Essentials:Â Google
- OWASP Top 10 - Risks 6-10:Â Infosec
- DeepLearning.AI TensorFlow Developer:Â DeepLearning.AI
- Threat Response:Â Cisco Learning and Certifications
- A Strategic Approach to Cybersecurity:Â University of Maryland, College Park
- Cybersecurity for Business:Â University of Colorado System
- Introduction to Social Media Marketing:Â Meta
- Security Operations:Â ISC2
- Excel to MySQL: Analytic Techniques for Business:Â Duke University