Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security response"
University of Alberta
Skills you'll gain: Sprint Planning, Project Risk Management, User Story, Backlogs, Agile Methodology, User Requirements Documents, Functional Requirement, Agile Project Management, Requirements Analysis
Skills you'll gain: Cloud Security, Data Management, Cloud Computing Architecture, Records Management, Security Management, Cloud Computing, Microsoft Azure, Threat Management, Disaster Recovery, Security Strategy, Cybersecurity, Data Governance, Information Assurance, Personally Identifiable Information, Security Controls, Information Privacy, General Data Protection Regulation (GDPR), Identity and Access Management
Google Cloud
Skills you'll gain: Cloud Security, System Configuration, Threat Detection, Security Information and Event Management (SIEM), Configuration Management, Google Cloud Platform, Security Management, Vulnerability Scanning, Vulnerability Management
Microsoft
Skills you'll gain: Business Software, Computer Hardware, Hardware Architecture, Generative AI, Operating Systems, Data Storage Technologies, Computer Systems, Data Maintenance, Enterprise Security, System Software, Information Technology, OS Process Management, Data Storage, System Configuration, Microsoft Windows, Technical Support, Servers, Cybersecurity
Skills you'll gain: Azure Active Directory, Active Directory, Microsoft Azure, Security Controls, Identity and Access Management, Security Information and Event Management (SIEM), Generative AI, Cloud Security, Data Governance, Authentications, Network Security, Role-Based Access Control (RBAC), Data Security, Cybersecurity, System Monitoring, Threat Detection, Multi-Factor Authentication, Encryption
Skills you'll gain: Splunk, Security Information and Event Management (SIEM), Data Modeling, Role-Based Access Control (RBAC), System Monitoring, Dashboard, Incident Response, Threat Detection, User Accounts, Data Transformation, Authorization (Computing), Cybersecurity, Machine Learning, Systems Administration, Performance Tuning, Event Monitoring, Continuous Monitoring, Data Analysis, Statistical Analysis, Pivot Tables And Charts
- Status: Free
Campus BBVA
Skills you'll gain: Computer Security Incident Management, Cyber Attacks, Cybersecurity, Threat Management, Security Awareness, Cyber Risk, Email Security, Data Security, Network Security, Business Process, Mobile Security, Multi-Factor Authentication
ConsenSys Academy
Skills you'll gain: Blockchain, Cryptography, Interoperability, Encryption, FinTech, Emerging Technologies, Distributed Computing, Digital Assets, Business Analysis, Systems Architecture, Transaction Processing
Skills you'll gain: Power BI, Dashboard, SQL, Microsoft SQL Servers, Business Intelligence, Data Security, Data Analysis, Data Visualization Software, Data Modeling, Data Management, Data-Driven Decision-Making
Skills you'll gain: Continuous Monitoring, Business Continuity, ISO/IEC 27001, Security Management, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
LearnQuest
Skills you'll gain: Package and Software Management, Linux Administration, Linux, Linux Commands, Virtual Private Networks (VPN), Linux Servers, System Monitoring, Public Key Infrastructure, File Management, Command-Line Interface, Intrusion Detection and Prevention, Git (Version Control System), File Systems, User Accounts, Firewall, Remote Access Systems, Cloud Computing Architecture, DevOps, Virtualization, Cloud Computing
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Data Security, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
In summary, here are 10 of our most popular security response courses
- Agile Planning for Software Products:Â University of Alberta
- Cybersecurity Management and Compliance:Â Microsoft
- Security Command Center Fundamentals:Â Google Cloud
- Introduction to Computers:Â Microsoft
- Microsoft SC-900 Exam Preparation and Practice:Â Microsoft
- SIEM Splunk Hands-On Guide:Â EDUCBA
- Cybersecurity for Managers:Â Campus BBVA
- Blockchain: Foundations and Use Cases:Â ConsenSys Academy
- Deploy and Maintain Power BI Assets and Capstone project:Â Microsoft
- Security and Risk Management:Â Packt