Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "federal information security management act"
Status: NewStatus: PreviewSkills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, DevSecOps, Application Security, Cloud Security, Cloud Standards, Security Controls, Security Testing, Application Development, Containerization, Software Development, CI/CD, Continuous Monitoring, Cybersecurity, Infrastructure as Code (IaC), Supply Chain, Dependency Analysis
Status: Free TrialJohns Hopkins University
Skills you'll gain: Game Theory, Data-Driven Decision-Making, Cybersecurity, Data Science, Algorithms, Reinforcement Learning, Machine Learning Algorithms, Applied Machine Learning, Machine Learning
Status: Free TrialUniversity at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Cloud Security, Authentications
Status: Free TrialSkills you'll gain: Remote Access Systems, Network Troubleshooting, Network Administration, Virtual Private Networks (VPN), Hardening, TCP/IP, Cybersecurity, Dynamic Host Configuration Protocol (DHCP), Human Factors (Security), Technical Support and Services, Encryption, Command-Line Interface, Authentications, Wireless Networks
Status: Free TrialNew York University
Skills you'll gain: Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cyber Security Policies, Cybersecurity, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Cryptography, Data Integrity
Status: Free TrialSkills you'll gain: Cyber Security Assessment, Security Testing, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Threat Modeling, Vulnerability Management, Application Security, Security Strategy, Security Controls, Security Requirements Analysis, Data Security, Security Information and Event Management (SIEM)
Status: Free TrialUniversity of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Operations, Cyber Governance, Security Management, NIST 800-53, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Legal Risk
Status: Free TrialUniversity of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geographic Information Systems, Geospatial Information and Technology, Encryption, Data Security, Network Security, Public Key Infrastructure, Wireless Networks, Extensible Markup Language (XML)
Status: Free TrialJohns Hopkins University
Skills you'll gain: Precision Medicine, Clinical Trials, Data Analysis, Data-Driven Decision-Making, Analytics, Data Science, Strategic Decision-Making, Root Cause Analysis, Random Forest Algorithm, Treatment Planning, Personalized Service, A/B Testing, Machine Learning, Online Advertising
Status: NewStatus: Free TrialSkills you'll gain: Zero Trust Network Access, Microsoft Azure, Cloud Platforms, Azure Active Directory, Cloud Security, Endpoint Detection and Response, Security Controls, Multi-Factor Authentication, Cloud Services, Cyber Security Strategy, Identity and Access Management, Data Security, Enterprise Security, Data Governance, Encryption

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Data Lakes, Cloud Storage, Data Security, Data Access, Role-Based Access Control (RBAC), Cloud Computing, Big Data, Data Analysis
Status: Free TrialRutgers the State University of New Jersey
Skills you'll gain: Supplier Management, Procurement, Supplier Relationship Management, Supplier Performance Management, Vendor Management, Case Studies, Strategic Sourcing, Contract Management, Request For Quotation (RFQ), Risk Management, Supply Chain Management, Business Ethics, Performance Analysis, Operational Analysis
In summary, here are 10 of our most popular federal information security management act courses
- Advanced Practices in Application Security: Starweaver
- Data Science Decisions in Time: Information Theory & Games: Johns Hopkins University
- Cyber Security in Manufacturing : University at Buffalo
- Advanced Security and Troubleshooting: Packt
- Enterprise and Infrastructure Security: New York University
- Security Assessment and Testing: Packt
- Homeland Security and Cybersecurity: University of Colorado System
- Advanced System Security Topics: University of Colorado System
- Data Science Decisions in Time: Using Causal Information: Johns Hopkins University
- Microsoft Security, Compliance & Identity Fundamentals: Whizlabs










