Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "computer security incident management"
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, ISO/IEC 27001, Computer Security Awareness Training, Cyber Risk, Information Assurance
Skills you'll gain: Security Information and Event Management (SIEM), Splunk, Threat Detection, Cybersecurity, Event Monitoring, Continuous Monitoring, Incident Response, Data Analysis Software, Data Management, Real Time Data, Data Storage, Software Installation, Query Languages, User Interface (UI)
Skills you'll gain: Incident Management, Incident Response, Security Management, Computer Security Incident Management, Continuous Monitoring, Infrastructure Security, Cybersecurity, Cyber Security Policies, Remote Access Systems, Telecommuting, Cyber Security Assessment, Security Strategy, Employee Engagement, Technology Roadmaps
University of Colorado System
Skills you'll gain: Computer Security, OSI Models, Systems Administration, Virtualization, Network Security, Information Technology, Information Systems Security, Enterprise Security, General Networking, Network Administration, Information Systems, Computer Networking, Virtual Machines, Computer Systems, Data Integrity
- Status: [object Object]
Skills you'll gain: Dashboard, Data Visualization Software, Data Wrangling, Data Visualization, SQL, Supervised Learning, Feature Engineering, Plotly, Interactive Data Visualization, Jupyter, Exploratory Data Analysis, Data Mining, Data Cleansing, Matplotlib, Data Analysis, Unsupervised Learning, Generative AI, Pandas (Python Package), Data Manipulation, Professional Networking
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cybersecurity, Security Management, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Cyber Attacks, Malware Protection, Email Security, Vulnerability Management, Artificial Intelligence
Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Detection, Threat Modeling, Network Analysis, Network Security, Network Monitoring, NIST 800-53, Cloud Security
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, MySQL, PostgreSQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Transformation, IBM DB2, Relational Databases, Jupyter, Generative AI
Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Cybersecurity, Cyber Security Policies, Investigation, Event Monitoring, Threat Detection, Contingency Planning, Communication Planning
Skills you'll gain: NIST 800-53, Risk Management Framework, Cyber Risk, Federal Information Security Management Act, Cybersecurity, Risk Management, Security Management, Cyber Governance, Cyber Security Strategy, Operational Risk, Governance Risk Management and Compliance, Security Controls, Continuous Monitoring, Infrastructure Security, Cyber Security Assessment, Enterprise Risk Management (ERM), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
Skills you'll gain: Vulnerability Management, Risk Analysis, Risk Management, Disaster Recovery, Incident Response, Business Continuity Planning, Security Management, Vulnerability Assessments, Threat Modeling, Computer Security Incident Management, Threat Management, Business Risk Management, Cyber Risk, Continuous Monitoring, Cybersecurity, Cyber Threat Intelligence, General Data Protection Regulation (GDPR)
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
In summary, here are 10 of our most popular computer security incident management courses
- Security Management and Governance: Royal Holloway, University of London
- Introduction to SIEM (Splunk): EDUCBA
- Incident Management and Continuous Improvement: LearnQuest
- Enterprise System Management and Security : University of Colorado System
- IBM Data Science: IBM
- Cybersecurity Case Studies and Capstone Project: IBM
- Advanced Network Analysis and Incident Response: Johns Hopkins University
- IBM Relational Database Administrator: IBM
- Incident Response and Recovery: ISC2
- Cybersecurity Risk Management Framework: Infosec