Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "identify security challenges"
Skills you'll gain: Continuous Monitoring, Business Continuity, ISO/IEC 27001, Security Management, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
University of California, Irvine
Skills you'll gain: Cyber Governance, Threat Management, Security Management, Cyber Risk, Compliance Management, Risk Management, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Information Assurance, Program Standards, Computer Security
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Skills you'll gain: Cloud Infrastructure, Kubernetes, Google Cloud Platform, Identity and Access Management, Infrastructure As A Service (IaaS), Application Deployment, Containerization, Cloud Applications, Cloud Computing, CI/CD, Cloud Computing Architecture, Cloud Security, Cloud Management, Load Balancing, Service Level Agreement, Infrastructure as Code (IaC), Virtual Machines, Microservices, Service Level, Network Planning And Design
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Infrastructure As A Service (IaaS), Application Deployment, Cloud Applications, Kubernetes, Cloud Computing, CI/CD, Cloud Security, Load Balancing, Service Level Agreement, Infrastructure as Code (IaC), Virtual Machines, Microservices, Service Level, Cloud Computing Architecture, Cloud Storage, Data Storage, Network Architecture
University of California, Irvine
Skills you'll gain: Cost Estimation, Stakeholder Management, Project Risk Management, Project Schedules, Work Breakdown Structure, Project Performance, Estimation, Conflict Management, Risk Analysis, Quality Management, Project Management, Timelines, Milestones (Project Management), Cost Management, Project Planning, Peer Review, Budgeting, Project Management Life Cycle, Scope Management, Change Management
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Role-Based Access Control (RBAC), Containerization
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
Skills you'll gain: Vulnerability Management, Azure Active Directory, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Generative AI, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Single Sign-On (SSO), Microsoft Azure, Security Management, Cyber Security Policies, Identity and Access Management, Data Management, Records Management, Authentications, System Monitoring, Data Ethics, ChatGPT
Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Data Security, Cyber Risk, Emerging Technologies, Business Technologies, Identity and Access Management, Business
Skills you'll gain: Site Reliability Engineering, Cloud Infrastructure, Kubernetes, Application Performance Management, Google Cloud Platform, System Monitoring, Infrastructure As A Service (IaaS), Application Deployment, Identity and Access Management, Cloud Applications, CI/CD, Containerization, Cloud Computing, Cloud Security, Cloud Management, Service Level Agreement, Continuous Delivery, Safety Culture, Network Monitoring, Continuous Integration
In summary, here are 10 of our most popular identify security challenges courses
- Security and Risk Management:Â Packt
- Security Governance & Compliance:Â University of California, Irvine
- IT Fundamentals for Cybersecurity:Â IBM
- Preparing for Google Cloud Certification: Cloud Architect:Â Google Cloud
- Architecting with Google Compute Engine:Â Google Cloud
- Project Management Principles and Practices:Â University of California, Irvine
- Cloud Security Risks: Identify and Protect Against Threats:Â Google Cloud
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- Cybersecurity Tools and Technologies:Â Microsoft
- Microsoft Azure Cybersecurity Tools and Solutions:Â Microsoft