Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "federal information security management act"
Status: Free TrialRutgers the State University of New Jersey
Skills you'll gain: Supplier Management, Procurement, Supplier Relationship Management, Supplier Performance Management, Vendor Management, Case Studies, Strategic Sourcing, Contract Management, Request For Quotation (RFQ), Risk Management, Supply Chain Management, Business Ethics, Performance Analysis, Operational Analysis
Status: Free TrialJohns Hopkins University
Skills you'll gain: Precision Medicine, Clinical Trials, Data Analysis, Data-Driven Decision-Making, Analytics, Data Science, Strategic Decision-Making, Root Cause Analysis, Random Forest Algorithm, Treatment Planning, Personalized Service, A/B Testing, Machine Learning, Online Advertising
Status: PreviewMicrosoft
Skills you'll gain: Prompt Engineering, Microsoft Copilot, Security Information and Event Management (SIEM), Cyber Threat Hunting, Security Software, Microsoft Azure, Security Controls, Cyber Security Assessment, Incident Response, Generative AI, Artificial Intelligence, Query Languages
Status: Free TrialSkills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Status: Free TrialSkills you'll gain: Blockchain, Threat Modeling, Application Security, Computer Security, Security Controls, Cybersecurity, Security Engineering, Data Security, Network Security, Information Systems Security, Cryptography, Vulnerability Assessments, Secure Coding, Cryptographic Protocols, Encryption, Key Management, Risk Management, Public Key Cryptography Standards (PKCS), Data Integrity, Distributed Computing
Status: Free TrialIllinois Tech
Skills you'll gain: Cloud Security, Identity and Access Management, AWS Identity and Access Management (IAM), Incident Response, Cloud Computing, Cloud Computing Architecture, Data Security, Application Security, Network Security, Encryption, Role-Based Access Control (RBAC), Amazon Web Services, Key Management, Infrastructure Security, Security Controls, Firewall, Continuous Monitoring, Multi-Factor Authentication
Status: PreviewSkills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), Automation, Event Monitoring, Cyber Threat Hunting, Continuous Monitoring, System Monitoring, Anomaly Detection, Cybersecurity, Data Analysis Software, Artificial Intelligence and Machine Learning (AI/ML)
Status: Free TrialUniversity of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, TCP/IP, Network Analysis
Status: Free TrialGoogle Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Security Controls, Virtual Private Networks (VPN), Firewall, Network Security, Data Access, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Authentications, User Accounts, Load Balancing, Encryption
Status: NewStatus: Free TrialUniversity of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Vulnerability Assessments, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Status: Free TrialSkills you'll gain: Network Security, Encryption, OSI Models, IT Security Architecture, Network Performance Management, Network Architecture, Computer Networking, Network Monitoring, Remote Access Systems, TCP/IP, Network Infrastructure, Network Troubleshooting, Network Protocols, Infrastructure Security, Wireless Networks, Virtual Private Networks (VPN), Endpoint Security, Cloud Security, Routing Protocols, Software-Defined Networking
Status: Free TrialSkills you'll gain: Risk Analysis, Risk Management, Cybersecurity, Network Security, Incident Response, Cloud Security, Risk Management Framework, Authentications, Business Continuity Planning, Application Security, IT Management, Security Management, Threat Modeling, Threat Management, OSI Models, Disaster Recovery, Cryptography, Encryption, Cyber Risk, Vulnerability Assessments
In summary, here are 10 of our most popular federal information security management act courses
- Supplier Management: Rutgers the State University of New Jersey
- Data Science Decisions in Time: Using Causal Information: Johns Hopkins University
- Microsoft Copilot for Security: Microsoft
- Security Architecture and Engineering: Packt
- Blockchain Security - Foundational Concepts: LearnQuest
- Cloud Computing Security - Master's: Illinois Tech
- Automated Cyber Security Incident Response: EDUCBA
- Introduction to Computer Security: University of London
- Managing Security in Google Cloud: Google Cloud
- Security and Ethical Hacking: University of Colorado Boulder










