Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security best practices"
University of Pennsylvania
Skills you'll gain: Social Media Strategy, Consumer Behaviour, Influencing, Content Creation, Marketing Communications, Social Media Marketing, Social Media, Social Sciences, Advertising, Marketing Psychology, Storytelling, Marketing Strategy and Techniques, Communication, Sociology
Skills you'll gain: Order Fulfillment, E-Commerce, Campaign Management, Retail Management, Customer Engagement, Marketing Strategies, Market Research, Digital Marketing, Shipping and Receiving, Advertising, Retail Sales, Web Analytics, Trend Analysis, Market Trend
Skills you'll gain: Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Security Awareness, Cyber Threat Intelligence, Malware Protection, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training
- Status: Free
Duke University
Skills you'll gain: Psychology, Learning Theory, Anthropology, Social Sciences, Research, General Science and Research, Scientific Methods, Non-Verbal Communication
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Cyber Governance, Risk Mitigation, Vendor Management, Risk Modeling, Threat Management, Vulnerability Assessments, Security Management, Cyber Risk, Compliance Management, Cyber Security Policies, Cybersecurity, Security Awareness, Cyber Security Strategy
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Stakeholder Communications, Incident Response, Intrusion Detection and Prevention, Threat Management, Business Risk Management, Network Security, Vulnerability Assessments, Operating Systems, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Computer Security Incident Management, Security Awareness, Bash (Scripting Language), Event Monitoring, Security Controls, Cybersecurity, Debugging
Skills you'll gain: Exploratory Data Analysis, Unsupervised Learning, Supervised Learning, Feature Engineering, Dimensionality Reduction, Data Cleansing, Applied Machine Learning, Data Access, Regression Analysis, Data Analysis, Machine Learning, Statistical Inference, Statistical Hypothesis Testing, Data Quality, Machine Learning Algorithms, Classification And Regression Tree (CART), Scikit Learn (Machine Learning Library), Probability & Statistics, Data Validation, Predictive Modeling
Intuit
Skills you'll gain: Bookkeeping, QuickBooks (Accounting Software), Financial Statements, Accounting Software, Financial Accounting, Accounting, Accounting Records, Balance Sheet, Income Statement, General Ledger, Business Ethics, Generally Accepted Accounting Principles (GAAP), Cash Flows, Journals
Skills you'll gain: Open Web Application Security Project (OWASP), Application Security, Threat Modeling, Secure Coding, DevSecOps, Encryption, Security Engineering, Security Testing, Security Software, Cryptography, Threat Management, Cloud Security, Risk Management Framework, DevOps, Cyber Engineering, Cloud API, Vulnerability Scanning, Security Management, Data Security, Threat Detection
University of Michigan
Skills you'll gain: Team Motivation, Employee Engagement, Team Management, Organizational Leadership, Goal Setting, People Development, Visionary, Influencing, Industrial and Organizational Psychology, Leadership, Cultural Diversity, Constructive Feedback, Performance Appraisal, Compensation Strategy, Communication
- Status: Free
West Virginia University
Skills you'll gain: Internal Controls, Financial Controls, Threat Detection, Anomaly Detection, Financial Auditing, Cybersecurity, Financial Data, Investigation, Analytics, Specialized Accounting, Advanced Analytics, Security Awareness, Big Data, Business Ethics, Analysis, Compliance Reporting, Data Analysis Software, Ethical Standards And Conduct
EIT Digital
Skills you'll gain: Embedded Systems, Embedded Software, Internet Of Things, Cryptography, Operating Systems, Security Requirements Analysis, Network Architecture, Network Security, Cybersecurity, Real Time Data, Web Services, Encryption, Engineering Software, Network Protocols, Public Key Cryptography Standards (PKCS), Wireless Networks, Computer Programming, C (Programming Language), System Testing, System Design and Implementation
In summary, here are 10 of our most popular security best practices courses
- Viral Marketing and How to Craft Contagious Content:Â University of Pennsylvania
- Make the Sale: Build, Launch, and Manage E-commerce Stores:Â Google
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council
- Dog Emotion and Cognition:Â Duke University
- Introduction to Cybersecurity & Risk Management:Â University of California, Irvine
- Ciberseguridad de Google:Â Google
- IBM Introduction to Machine Learning:Â IBM
- Bookkeeping Basics:Â Intuit
- Fundamentals of Secure Software:Â Packt
- Inspiring and Motivating Individuals:Â University of Michigan