Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "computer security incident management"
Skills you'll gain: Security Management, Incident Management, Threat Management, Cyber Governance, Risk Management Framework, Security Strategy, Cybersecurity, Cyber Security Policies, Information Assurance, Cyber Security Assessment, Security Controls, Vulnerability Assessments, Cyber Risk, Security Requirements Analysis, Security Awareness, Disaster Recovery
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
University of Colorado System
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Risk Management, Enterprise Security, Cyber Security Assessment, Vulnerability Assessments, Encryption, Network Security, Data Security, Cryptography, Security Awareness, Information Assurance
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
Skills you'll gain: Security Controls, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Security Policies, Network Analysis, Security Information and Event Management (SIEM), Ethical Standards And Conduct, SQL
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Cyber Operations, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Threat Management
Skills you'll gain: Computer Hardware, Technical Support, Software Installation, Help Desk Support, Information Technology, Hardware Troubleshooting, Microsoft Windows, Linux, Computer Networking, Computational Logic, Technical Documentation
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Puppet (Configuration Management Tool), CI/CD, Containerization, Debugging, Bash (Scripting Language), Infrastructure as Code (IaC), Docker (Software), Continuous Deployment, Continuous Integration, Technical Communication, Network Troubleshooting, Linux Commands, Linux, Scripting, Automation, Python Programming, Computer Programming
Google
Skills you'll gain: Agile Project Management, Backlogs, Agile Methodology, User Story, Sprint Planning, Product Roadmaps, Sprint Retrospectives, Employee Coaching, Team Management, Cross-Functional Collaboration, Prioritization
Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Multi-Factor Authentication, Public Key Infrastructure, Mobile Security, Wireless Networks
Skills you'll gain: Cyber Governance, Security Strategy, Security Management, Incident Management, Cyber Security Strategy, Business Continuity Planning, IT Security Architecture, Computer Security Incident Management, Business Continuity, Disaster Recovery, IT Management, Cybersecurity, Contingency Planning, Governance, Cyber Risk, Asset Management, Cyber Security Policies, Cyber Security Assessment, Information Assurance, Risk Analysis
In summary, here are 10 of our most popular computer security incident management courses
- Certified Information Security Manager (CISM): Packt
- IT Fundamentals for Cybersecurity: IBM
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- Introduction to Cybersecurity for Business: University of Colorado System
- Connect and Protect: Networks and Network Security: Google
- Foundations of Cybersecurity: Google
- In the Trenches: Security Operations Center : EC-Council
- Technical Support Fundamentals: Google
- Google IT Automation with Python: Google
- Agile Project Management: Google