Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security control implementation"
Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Vulnerability Management, Secure Coding, Encryption, Cybersecurity, Infrastructure Security, Computer Security, Threat Modeling, Public Key Infrastructure, Data Security, Authentications, Data Integrity
Infosec
Skills you'll gain: Risk Management Framework, Federal Information Security Management Act, NIST 800-53, Risk Management, Cyber Risk, Security Management, Operational Risk, Governance Risk Management and Compliance, Continuous Monitoring, Regulatory Requirements, Law, Regulation, and Compliance, Cyber Security Policies, Risk Analysis, Security Controls, Authorization (Computing), Project Management Life Cycle, Cyber Security Assessment
Stanford University
Skills you'll gain: Data Ethics, Artificial Intelligence, Healthcare Industry Knowledge, Health Care, Patient Safety, Health Assessment, Machine Learning, Regulatory Compliance, Application Deployment, Clinical Data Management, Decision Support Systems, Predictive Modeling, Data Quality
Skills you'll gain: Peer Review, Creativity, Storytelling, Writing, Content Creation
Skills you'll gain: Project Scoping, Cost Management, Scope Management, Project Schedules, Earned Value Management, Scheduling, Work Breakdown Structure, Estimation, Requirements Management, Change Management, Project Management, Budgeting, Project Planning, Stakeholder Management
Skills you'll gain: Identity and Access Management, Endpoint Security, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Data Security, Cyber Security Strategy, Secure Coding, Firewall, Application Security, Authentications, Security Controls, Authorization (Computing), Security Information and Event Management (SIEM), Data Governance, Incident Response
- Status: Free
The University of Melbourne
Skills you'll gain: Operations Research, Combinatorics, Applied Mathematics, Graph Theory, Algorithms, Mathematical Modeling, Computational Thinking, Linear Algebra, Computer Programming, Program Development
University of Michigan
Skills you'll gain: Data Ethics, Information Privacy, Personally Identifiable Information, Data Security, Data Governance, Ethical Standards And Conduct, Big Data, Law, Regulation, and Compliance, Data Analysis, Social Sciences, Data-Driven Decision-Making, Diversity Awareness
University of Colorado System
Skills you'll gain: Requirements Elicitation, Software Design Documents, Requirements Analysis, Security Requirements Analysis, Mockups, Interviewing Skills, User Requirements Documents, Storyboarding, Functional Requirement, Goal Setting, Software Documentation, Agile Methodology, Business Requirements, Unified Modeling Language, Risk Management Framework, System Requirements, Meeting Facilitation, Prototyping, Software Development Life Cycle, Technical Documentation
University of Colorado Boulder
Skills you'll gain: Process Control, Production Process, Manufacturing Processes, Embedded Systems, Electronic Systems, Electronic Components, Emerging Technologies, Performance Tuning, Product Testing
Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Multi-Factor Authentication, Public Key Infrastructure, Mobile Security, Wireless Networks
University of California, Irvine
Skills you'll gain: Vendor Management, Security Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Security Controls, Human Factors (Security), Asset Protection, Due Diligence
In summary, here are 10 of our most popular security control implementation courses
- Security Architecture and Engineering: Packt
- NIST DoD RMF: Infosec
- Evaluations of AI Applications in Healthcare: Stanford University
- Songwriting: Writing the Lyrics: Berklee
- Engineering Project Management: Scope, Time and Cost Management: Rice University
- Cybersecurity Architecture: IBM
- Discrete Optimization: The University of Melbourne
- Data Science Ethics: University of Michigan
- Requirements Engineering: Secure Software Specifications: University of Colorado System
- Sensor Manufacturing and Process Control: University of Colorado Boulder