Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "identify security challenges"
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cybersecurity, Security Management, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Cyber Attacks, Malware Protection, Email Security, Vulnerability Management, Artificial Intelligence
Skills you'll gain: Network Security, Cloud Computing, Network Infrastructure, Microsoft Azure, Firewall, Computer Networking, Virtualization and Virtual Machines, Networking Hardware, Cybersecurity, Network Protocols, Artificial Intelligence and Machine Learning (AI/ML)
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Threat Intelligence, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Governance, Continuous Monitoring, Security Management, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Infrastructure Architecture
University of Colorado System
Skills you'll gain: Computer Security, OSI Models, Systems Administration, Virtualization, Network Security, Information Technology, Information Systems Security, Enterprise Security, General Networking, Network Administration, Information Systems, Computer Networking, Virtual Machines, Computer Systems, Data Integrity
University of Alberta
Skills you'll gain: Requirements Analysis, Agile Software Development, Agile Methodology, Kanban Principles, Requirements Elicitation, Sprint Retrospectives, Requirements Management, Functional Requirement, Business Requirements, Sprint Planning, Software Development Methodologies, Project Risk Management, Software Development Life Cycle, Scrum (Software Development), Software Technical Review, Software Development, Product Management, Agile Project Management, User Story, Backlogs
Kennesaw State University
Skills you'll gain: Cyber Governance, Risk Management Framework, Risk Analysis, Risk Management, Threat Detection, Threat Management, Business Risk Management, Cyber Risk, Security Management, Governance, Cybersecurity, Cyber Security Strategy, Security Strategy, Asset Management
Skills you'll gain: Debugging, Cybersecurity, Programming Principles, Python Programming, Scripting, Automation, File Management, Data Structures
University of Colorado System
Skills you'll gain: Windows Servers, Authorization (Computing), Microsoft Windows, Authentications, User Accounts, Group Policy, Security Controls, Active Directory, Identity and Access Management, Software Installation, Servers, Encryption, Network Planning And Design, Network Performance Management
DeepLearning.AI
Skills you'll gain: Natural Language Processing, Supervised Learning, Markov Model, Text Mining, Dimensionality Reduction, Artificial Intelligence, Keras (Neural Network Library), Artificial Neural Networks, PyTorch (Machine Learning Library), Machine Learning, Deep Learning, Data Processing, Feature Engineering, Algorithms, Tensorflow, Computer Programming, Machine Learning Methods, Unstructured Data, Regression Analysis, Bayesian Statistics
University of Colorado Boulder
Skills you'll gain: Internet Of Things, General Networking, Wireless Networks, Computer Networking, Automation, Network Protocols, Emerging Technologies, Information Systems Security, Cybersecurity, Operating Systems, Network Security, Encryption, Software Systems, Data Security, Cloud Platforms, Authentications
Skills you'll gain: Social Media Strategy, Social Media, Social Media Marketing, Content Creation, Social Media Management, Marketing Strategies, Marketing Analytics, Customer Engagement, Digital Marketing, Brand Awareness, Advertising, Target Audience
Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Security Controls, Vulnerability Assessments, Incident Response, Intrusion Detection and Prevention, Malware Protection, Network Architecture
In summary, here are 10 of our most popular identify security challenges courses
- Cybersecurity Case Studies and Capstone Project:Â IBM
- Introduction to Networking and Cloud Computing:Â Microsoft
- Homeland Security and Cybersecurity:Â University of Colorado System
- Enterprise System Management and Security :Â University of Colorado System
- Software Product Management:Â University of Alberta
- Implementing a Risk Management Framework :Â Kennesaw State University
- Automate Cybersecurity Tasks with Python:Â Google
- Windows Server Management and Security:Â University of Colorado System
- Natural Language Processing:Â DeepLearning.AI
- Industrial IoT Markets and Security:Â University of Colorado Boulder