Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security response"
Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, Infrastructure as Code (IaC), Cyber Security Policies, Security Controls, Security Strategy, Identity and Access Management, Threat Detection
Skills you'll gain: ISO/IEC 27001, Risk Management, Personally Identifiable Information, Business Risk Management, Security Controls, System Implementation, Information Privacy, Security Management, Security Strategy
University of Pennsylvania
Skills you'll gain: Data Ethics, Data Governance, Data Security, Governance, Business Strategy, Organizational Strategy, Business Transformation, Artificial Intelligence, Business Ethics, Analytics, Big Data, Machine Learning, Innovation, Algorithms
EIT Digital
Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Management, Data Access, Vulnerability Assessments, Encryption, Information Privacy, Data Management, Big Data, Authorization (Computing)
The Hong Kong University of Science and Technology
Skills you'll gain: Software Design Patterns, Requirements Analysis, Systems Development Life Cycle, Software Architecture, Acceptance Testing, Software Development Methodologies, Unified Modeling Language, Software Development Life Cycle, Configuration Management, Software Quality Assurance, Debugging, Engineering Software, Software Design, Process Driven Development, Software Engineering, Software Testing, Object Oriented Design, Functional Requirement, Data Modeling, Systems Design
Microsoft
Skills you'll gain: Data Storytelling, Power BI, Data Presentation, Dashboard, Data Visualization Software, Data Visualization, Microsoft Power Platform, Data Analysis, Creative Design, Data Mapping, Data Security
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability
Microsoft
Skills you'll gain: Cascading Style Sheets (CSS), GitHub, Database Management, C# (Programming Language), Microsoft SQL Servers, HTML and CSS, ASP.NET, Load Balancing, Role-Based Access Control (RBAC), Scalability, Object Oriented Programming (OOP), Authentications, Full-Stack Web Development, .NET Framework, Programming Principles, Application Programming Interface (API), Graph Theory, User Interface (UI), User Interface and User Experience (UI/UX) Design, Data Structures
Skills you'll gain: Continuous Monitoring, Business Continuity, ISO/IEC 27001, Security Management, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Contingency Planning, Risk Management, Cyber Security Strategy, Security Management, Cybersecurity, Governance, Information Technology, Staff Management, Proposal Development, Organizational Structure, Presentations
Institut Mines-Télécom
Skills you'll gain: Wireless Networks, Network Architecture, Network Security, Network Infrastructure, Service Oriented Architecture, Network Performance Management, Computer Networking, Emerging Technologies, Network Protocols, Mobile Security, Digital Communications, Authentications, Encryption
Johns Hopkins University
Skills you'll gain: Health Care, Primary Care, Trauma Care, Preventative Care, Patient Safety, Mental and Behavioral Health Specialties, Crisis Intervention, Infectious Diseases, Health Assessment, Health Care Procedure and Regulation, Direct Patient Care, Behavioral Health, Clinical Experience, Diversity Awareness, Social Justice, Criminal Investigation and Forensics, Community and Social Work, Advocacy
In summary, here are 10 of our most popular security response courses
- Strategies for Cloud Security Risk Management:Â Google Cloud
- Understanding ISO Security Standards for Your Organization:Â Codio
- AI Strategy and Governance:Â University of Pennsylvania
- Security and Privacy for Big Data - Part 1:Â EIT Digital
- Software Engineering:Â The Hong Kong University of Science and Technology
- Creative Designing in Power BI :Â Microsoft
- Introduction to Applied Cryptography:Â University of Colorado System
- Microsoft Full-Stack Developer:Â Microsoft
- Security and Risk Management:Â Packt
- Road to the CISO – Culminating Project Course: Kennesaw State University