Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "post-incident evaluation"
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Stakeholder Communications, Incident Response, Intrusion Detection and Prevention, Threat Management, Business Risk Management, Network Security, Vulnerability Assessments, Operating Systems, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Computer Security Incident Management, Security Awareness, Bash (Scripting Language), Event Monitoring, Security Controls, Cybersecurity, Debugging
Michigan State University
Skills you'll gain: Design Elements And Principles, Graphic and Visual Design, Post-Production, Color Theory, Digital Design, File Management, Adobe Creative Cloud, Storytelling, Editing
Skills you'll gain: Open Web Application Security Project (OWASP), Security Controls, Risk Management, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, NIST 800-53, Cyber Security Policies, Cyber Risk, Safety Audits, Threat Detection, Compliance Auditing
DeepLearning.AI
Skills you'll gain: Tensorflow, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Performance Tuning, Machine Learning Methods, Artificial Neural Networks, Applied Machine Learning, Machine Learning, Supervised Learning, Machine Learning Algorithms, Network Architecture, Algorithms, Analysis, Debugging
University of Minnesota
Skills you'll gain: Payment Systems, Healthcare Industry Knowledge, Cost Benefit Analysis, Clinical Trials, Financial Regulations, Program Evaluation, Medical Science and Research, Pharmaceuticals, Risk Analysis, Health Systems, Health Care, Regulatory Affairs, Medicare, Insurance, Probability & Statistics, Stakeholder Engagement
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Peripheral Devices, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Cybersecurity, Configuration Management, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Security Awareness, Cloud Platforms
- Status: Free
Johns Hopkins University
Skills you'll gain: Epidemiology, Business Metrics, Infectious Diseases, Interactive Data Visualization, Analysis, Threat Detection, Data Presentation, Decision Support Systems
University of Illinois Urbana-Champaign
Skills you'll gain: Organizational Change, Revenue Recognition, Organizational Structure, Governance, Financial Statements, Agile Methodology, Organizational Strategy, Waterfall Methodology, Organizational Leadership, Accrual Accounting, Project Closure, Business Management, Organizational Effectiveness, Business Ethics, Cash Flows, Change Management, Accounting Records, Financial Accounting, Project Implementation, Project Planning
Skills you'll gain: CI/CD, Open Web Application Security Project (OWASP), Istio, Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Kubernetes, Jenkins, Bash (Scripting Language), Cloud Services, DevOps, Git (Version Control System), Jupyter, Grafana
- Status: Free
UNSW Sydney (The University of New South Wales)
Skills you'll gain: Instructional Strategies, Teaching, Course Development, Blended Learning, Education and Training, Interactive Learning, Student Engagement, Curriculum Planning, Pedagogy, Developing Training Materials, Educational Materials, Instructional and Curriculum Design, Curriculum Development, Instructional Design, Open Source Technology, Program Evaluation, Quality Assessment, Needs Assessment, Technology Strategies, Constructive Feedback
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Macquarie University
Skills you'll gain: Overcoming Objections, Influencing, Risk Management Framework, Persuasive Communication, Governance, Storytelling, Risk Management, Change Management, Organizational Change, Rapport Building, Meeting Facilitation, Conflict Management, Enterprise Risk Management (ERM), Business Transformation, Risk Analysis, Negotiation, Organizational Effectiveness, Stakeholder Management, Leadership, Process Management
In summary, here are 10 of our most popular post-incident evaluation courses
- Ciberseguridad de Google:Â Google
- Principles of Photo Composition and Digital Image Post-Production:Â Michigan State University
- Play It Safe: Manage Security Risks:Â Google
- Improving Deep Neural Networks: Hyperparameter Tuning, Regularization and Optimization:Â DeepLearning.AI
- Medical Technology and Evaluation:Â University of Minnesota
- IBM and ISC2 Cybersecurity Specialist:Â IBM
- Measuring and Maximizing Impact of COVID-19 Contact Tracing:Â Johns Hopkins University
- Business Value and Project Management:Â University of Illinois Urbana-Champaign
- IBM DevOps and Software Engineering:Â IBM
- Learning to Teach Online:Â UNSW Sydney (The University of New South Wales)