Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security controls"
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, ISO/IEC 27001, Computer Security Awareness Training, Cyber Risk, Information Assurance
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Infrastructure Security, Firewall, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing, System Configuration
Skills you'll gain: Site Reliability Engineering, Cloud Infrastructure, Kubernetes, Application Performance Management, Google Cloud Platform, System Monitoring, Infrastructure As A Service (IaaS), Application Deployment, Identity and Access Management, Cloud Applications, CI/CD, Containerization, Cloud Computing, Cloud Security, Cloud Management, Service Level Agreement, Continuous Delivery, Safety Culture, Network Monitoring, Continuous Integration
Skills you'll gain: Cloud Infrastructure, Kubernetes, Google Cloud Platform, Identity and Access Management, Infrastructure As A Service (IaaS), Application Deployment, Containerization, Cloud Applications, Cloud Computing, CI/CD, Cloud Computing Architecture, Cloud Security, Cloud Management, Load Balancing, Service Level Agreement, Infrastructure as Code (IaC), Virtual Machines, Microservices, Service Level, Network Planning And Design
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Cryptographic Protocols, Data Security, Email Security, Computer Security Awareness Training, Advanced Encryption Standard (AES), Security Awareness, Key Management, Secure Coding, Technical Support and Services, Information Technology, Cyber Security Strategy
University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, System Monitoring, System Implementation, Systems Administration, Virtualization, Network Security, Linux Commands
Kennesaw State University
Skills you'll gain: Network Security, Security Management, Firewall, Cyber Attacks, Network Monitoring, Cybersecurity, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, Continuous Monitoring, TCP/IP, Intrusion Detection and Prevention, Threat Detection, Mobile Security, Cryptography, Encryption
- Status: Free
Universiteit Leiden
Skills you'll gain: Risk Management, Business Risk Management, Operational Risk, Risk Analysis, Safety and Security, Environmental Issue, Public Safety and National Security, Cyber Security Strategy
Skills you'll gain: Cloud Infrastructure, Kubernetes, Google Cloud Platform, Identity and Access Management, Infrastructure As A Service (IaaS), Containerization, Cloud Applications, Cloud Management, Load Balancing, Cloud Engineering, Infrastructure as Code (IaC), Virtual Machines, Cloud Computing Architecture, Cloud Computing, Cloud Storage, Data Storage, Application Deployment, Docker (Software), Network Infrastructure, Cloud Services
University of California, Irvine
Skills you'll gain: Cyber Governance, Threat Management, Security Management, Cyber Risk, Compliance Management, Risk Management, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Information Assurance, Program Standards, Computer Security
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Security Strategy, Risk Management Framework, Security Controls, Enterprise Security, Information Privacy
Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Multi-Factor Authentication, Public Key Infrastructure, Mobile Security, Wireless Networks
In summary, here are 10 of our most popular security controls courses
- Security Management and Governance:Â Royal Holloway, University of London
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks
- Preparing for Google Cloud Certification: Cloud DevOps Engineer:Â Google Cloud
- Preparing for Google Cloud Certification: Cloud Architect:Â Google Cloud
- Cybersecurity Fundamentals:Â IBM
- Computer Security and Systems Management:Â University of Colorado System
- Managing Network Security:Â Kennesaw State University
- Risk in Modern Society :Â Universiteit Leiden
- Preparing for Google Cloud Certification: Cloud Engineer:Â Google Cloud
- Security Governance & Compliance:Â University of California, Irvine