Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "federal information security management act"

Coursera
Skills you'll gain: Cybersecurity, Threat Management, Security Controls, Cyber Security Strategy, Threat Detection, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Data Security, Network Security, Enterprise Security, Information Assurance, Incident Response, Data Integrity
Status: Free TrialInfosec
Skills you'll gain: File Systems, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Data Security, Litigation Support, File Management, Network Security, Operating Systems, Data Structures, General Networking, Data Validation, Record Keeping, System Software, Data Integrity, Data Analysis Software, User Accounts, USB, System Configuration
Status: NewStatus: Free TrialSkills you'll gain: Penetration Testing, Malware Protection, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Threat Detection, Email Security, Vulnerability Assessments, Human Factors (Security), Network Analysis
Status: NewSkills you'll gain: Blockchain, Cryptography, Cybersecurity, Enterprise Application Management, Cyber Attacks, Emerging Technologies, Financial Trading, Digital Assets, Cyber Security Assessment, FinTech, Payment Systems, Security Testing, Transaction Processing
Status: NewStatus: Free TrialSkills you'll gain: Package and Software Management, Linux Administration, Linux, User Accounts, Command-Line Interface, Operating System Administration, Open Source Technology, Disaster Recovery, Red Hat Enterprise Linux, System Monitoring, Unix Commands, System Configuration, Identity and Access Management, Data Storage Technologies, Systems Administration, Linux Commands, Configuration Management, Patch Management, Security Controls, Software Installation
Status: Free TrialUniversity of Colorado Boulder
Skills you'll gain: Data Security, Cybersecurity, Cyber Attacks, Data Ethics, Authentications, Authorization (Computing), Cryptography, Human Factors (Security), Security Controls, Security Awareness, Information Privacy, Threat Modeling, Computer Security Incident Management, Risk Analysis, Technical Communication, Problem Solving, Communication
Status: Free TrialSkills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Security Controls, Vulnerability Assessments, Identity and Access Management, Asset Management
Status: NewGoogle Cloud
Skills you'll gain: Large Language Modeling, LLM Application, Threat Modeling, Open Web Application Security Project (OWASP), Application Security, Responsible AI, Google Cloud Platform, Security Controls, Security Software, Security Requirements Analysis, Application Programming Interface (API), API Design, System Configuration
Status: Free TrialAmazon Web Services
Skills you'll gain: Serverless Computing, AWS Identity and Access Management (IAM), Event-Driven Programming, Solution Architecture, Cloud Computing Architecture, Amazon Web Services, Software Architecture, API Gateway, Hybrid Cloud Computing, Multi-Tenant Cloud Environments, Information Technology Architecture, Cloud Computing, Performance Tuning, Amazon DynamoDB, Amazon S3, Cloud Security, Amazon CloudWatch, AWS Kinesis, Data Analysis, Data Visualization
Status: Free TrialEC-Council
Skills you'll gain: Penetration Testing, Threat Modeling, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Security Awareness, Cybersecurity, Cloud Computing, Intrusion Detection and Prevention, Cyber Attacks, Application Security, Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
Status: Free TrialVanderbilt University
Skills you'll gain: Responsible AI, Generative AI, Data Ethics, Business Ethics, AI Personalization, Information Privacy, Threat Modeling, Personally Identifiable Information, Threat Detection, Security Controls, Cybersecurity, Law, Regulation, and Compliance, Prompt Engineering, Public Affairs, Artificial Intelligence
Status: NewGoogle Cloud
Skills you'll gain: LLM Application, Open Web Application Security Project (OWASP), Large Language Modeling, Secure Coding, Responsible AI, Application Security, Security Controls, Prompt Engineering, Google Cloud Platform, Cloud API, API Design, Configuration Management
In summary, here are 10 of our most popular federal information security management act courses
- Cybersecurity Best Practices: Coursera
- Computer Forensics: Infosec
- Ethical Hacking with Kali Linux: Analyze & Defend: EDUCBA
- Practical Blockchain and Cryptocurrency: Pearson
- Linux Fundamentals: Configure, Secure & Manage: EDUCBA
- Cybersecurity for Data Science: University of Colorado Boulder
- Advanced Cybersecurity Concepts and Capstone Project: Microsoft
- Model Armor: 안전한 AI 배포: Google Cloud
- Architecting Solutions on AWS: Amazon Web Services
- Ethical Hacking Essentials (EHE): EC-Council










