Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "federal information security management act"
Status: Free TrialJohns Hopkins University
Skills you'll gain: Precision Medicine, Clinical Trials, Data Analysis, Data-Driven Decision-Making, Analytics, Data Science, Strategic Decision-Making, Root Cause Analysis, Random Forest Algorithm, Treatment Planning, Personalized Service, A/B Testing, Machine Learning, Online Advertising
Status: PreviewMicrosoft
Skills you'll gain: Prompt Engineering, Microsoft Copilot, Security Information and Event Management (SIEM), Cyber Threat Hunting, Security Software, Microsoft Azure, Security Controls, Cyber Security Assessment, Incident Response, Generative AI, Artificial Intelligence, Query Languages
Status: Free TrialSkills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Status: Free TrialRutgers the State University of New Jersey
Skills you'll gain: Supplier Management, Procurement, Supplier Relationship Management, Supplier Performance Management, Vendor Management, Case Studies, Strategic Sourcing, Contract Management, Request For Quotation (RFQ), Risk Management, Supply Chain Management, Business Ethics, Performance Analysis, Operational Analysis
Status: Free TrialSkills you'll gain: Blockchain, Threat Modeling, Application Security, Computer Security, Security Controls, Cybersecurity, Security Engineering, Data Security, Network Security, Information Systems Security, Cryptography, Vulnerability Assessments, Secure Coding, Cryptographic Protocols, Encryption, Key Management, Risk Management, Public Key Cryptography Standards (PKCS), Data Integrity, Distributed Computing
Status: PreviewSkills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), Automation, Event Monitoring, Cyber Threat Hunting, Continuous Monitoring, System Monitoring, Anomaly Detection, Cybersecurity, Data Analysis Software, Artificial Intelligence and Machine Learning (AI/ML)
Status: Free TrialSkills you'll gain: Risk Analysis, Risk Management, Cybersecurity, Network Security, Incident Response, Cloud Security, Risk Management Framework, Authentications, Business Continuity Planning, Application Security, IT Management, Security Management, Threat Modeling, Threat Management, OSI Models, Disaster Recovery, Cryptography, Encryption, Cyber Risk, Vulnerability Assessments
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Application Security, Key Management, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Data Integrity, Authentications, Hardware Architecture, Emerging Technologies
Status: Free TrialSkills you'll gain: Application Security, Open Web Application Security Project (OWASP), Angular, OAuth, Test Driven Development (TDD), Cryptography, Data Validation, Unit Testing, Vue.JS, Data Security, Authentications, HTML and CSS, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Web Applications, JavaScript Frameworks, Javascript, Security Strategy, Computer Programming
Status: Free TrialGoogle Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Security Controls, Virtual Private Networks (VPN), Firewall, Network Security, Data Access, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Authentications, User Accounts, Load Balancing, Encryption
Status: Free TrialSkills you'll gain: Network Security, Encryption, OSI Models, IT Security Architecture, Network Performance Management, Network Architecture, Computer Networking, Network Monitoring, Remote Access Systems, TCP/IP, Network Infrastructure, Network Troubleshooting, Network Protocols, Infrastructure Security, Wireless Networks, Virtual Private Networks (VPN), Endpoint Security, Cloud Security, Routing Protocols, Software-Defined Networking
Status: Free TrialIllinois Tech
Skills you'll gain: Cloud Security, Identity and Access Management, AWS Identity and Access Management (IAM), Incident Response, Cloud Computing, Cloud Computing Architecture, Data Security, Application Security, Network Security, Encryption, Role-Based Access Control (RBAC), Amazon Web Services, Key Management, Infrastructure Security, Security Controls, Firewall, Continuous Monitoring, Multi-Factor Authentication
In summary, here are 10 of our most popular federal information security management act courses
- Data Science Decisions in Time: Using Causal Information: Johns Hopkins University
- Microsoft Copilot for Security: Microsoft
- Security Architecture and Engineering: Packt
- Supplier Management: Rutgers the State University of New Jersey
- Blockchain Security - Foundational Concepts: LearnQuest
- Automated Cyber Security Incident Response: EDUCBA
- Systems Security Certified Practitioner: Packt
- Cyber Security: Applied Cryptography: Macquarie University
- Web Technologies and Security: Codio
- Managing Security in Google Cloud: Google Cloud










