Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security response"
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Security Controls, Virtual Private Networks (VPN), Cloud Computing, Firewall, Network Security, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Authentications, Public Cloud
University of Michigan
Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, General Networking, Computer Networking, Encryption, Web Servers, Innovation, Hypertext Markup Language (HTML)
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, Network Planning And Design, Network Architecture, General Networking, Network Performance Management, Computer Networking, Wireless Networks, Software-Defined Networking, Algorithms, System Programming, Data Integrity, Virtualization
Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Vulnerability Management, Threat Modeling, Risk Management Framework, Security Management, Information Systems Security, Vulnerability Assessments, Information Assurance, Cybersecurity, Cyber Security Policies, Security Controls, Continuous Monitoring, Disaster Recovery, Technical Communication
Skills you'll gain: Bash (Scripting Language), Linux Commands, Command-Line Interface, Operating Systems, SQL, Linux, Cybersecurity, Linux Administration, Databases, Computer Hardware, Relational Databases, File Systems, User Accounts
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Cloud Computing, Cloud Storage, Data Storage, Cloud Security, System Monitoring, Encryption, SQL
Skills you'll gain: Risk Control, Compliance Reporting, Risk Management, Risk Management Framework, Risk Mitigation, Threat Management, Operational Risk, Business Risk Management, Risk Analysis, Management Reporting, Enterprise Risk Management (ERM), Security Controls, Continuous Monitoring, Security Testing, Key Performance Indicators (KPIs), Stakeholder Communications
Skills you'll gain: Microsoft Azure, Identity and Access Management, Network Security, Cloud Security, Azure Active Directory, Security Management, Security Information and Event Management (SIEM), Firewall, Continuous Monitoring, Key Management, Incident Response, Threat Detection, Virtual Machines
Copenhagen Business School
Skills you'll gain: Business Strategy, Business Planning, Strategic Decision-Making, Strategic Thinking, Plan Execution, Goal Setting, Organizational Strategy, Resource Management, Peer Review, Competitive Analysis, Innovation, Organizational Structure, Project Implementation, Market Analysis, Culture Transformation, Change Management, Business Strategies, Business, Global Marketing, Strategic Leadership
- Status: Free
Case Western Reserve University
Skills you'll gain: Criminal Investigation and Forensics, International Relations, Adjudication, Diplomacy, Law, Regulation, and Compliance, Public Safety and National Security, Political Sciences, Ethical Standards And Conduct, Social Justice, Advocacy, Research, Interactive Learning, Policy Analysis
Juniper Networks
Skills you'll gain: Intrusion Detection and Prevention, Juniper Network Technologies, Network Security, Firewall, Security Software, Threat Management, Network Administration, Proxy Servers, Cloud Security, Email Security, TCP/IP, Malware Protection, Threat Detection, User Accounts, System Configuration, Content Management
University at Buffalo
Skills you'll gain: Model Based Systems Engineering, Systems Engineering, Product Lifecycle Management, Intrusion Detection and Prevention, Security Controls, Performance Measurement, Anomaly Detection, Machine Controls, Incident Response, Digital Transformation, Vulnerability Assessments, Software Development Life Cycle, Product Engineering, Cybersecurity, Supply Chain Management, Manufacturing Processes, Supply Chain Planning, Data Sharing, Manufacturing Operations, Constructive Feedback
In summary, here are 10 of our most popular security response courses
- Managing Security in Google Cloud:Â Google Cloud
- Internet History, Technology, and Security:Â University of Michigan
- Computer Communications:Â University of Colorado System
- Foundations of Information Security and Incident Handling:Â Packt
- Tools of the Trade: Linux and SQL:Â Google
- Essential Google Cloud Infrastructure: Core Services:Â Google Cloud
- Risk Response and Reporting Effectively:Â Packt
- Azure: Security Operations Management:Â Whizlabs
- Strategic Management and Innovation:Â Copenhagen Business School
- Introduction to International Criminal Law:Â Case Western Reserve University