Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security control implementation"
- Status: Free
Georgia Institute of Technology
Skills you'll gain: User Experience Design, Prototyping, User Centered Design, Usability, Requirements Analysis, User Interface (UI), Interaction Design, Usability Testing, User Research
University of California, Davis
Skills you'll gain: ArcGIS, GIS Software, Spatial Analysis, Data Storytelling, Spatial Data Analysis, Geographic Information Systems, Data Presentation, Data Sharing, Geospatial Mapping, Geospatial Information and Technology, Land Management, Heat Maps, Epidemiology, Metadata Management, Data Mapping, Data Visualization Software, Data Quality, File Management, Network Analysis, Data Modeling
- Status: Free
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Cryptographic Protocols, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Mathematical Software, Algorithms, Probability
- Status: Free
University of Toronto
Skills you'll gain: Relationship Building, Social Skills, Personal Development, Active Listening, Interpersonal Communications, Communication, Empathy, Self-Awareness, Emotional Intelligence, Needs Assessment, Psychology, Cultural Diversity
- Status: Free
Case Western Reserve University
Skills you'll gain: Criminal Investigation and Forensics, International Relations, Adjudication, Diplomacy, Law, Regulation, and Compliance, Public Safety and National Security, Political Sciences, Ethical Standards And Conduct, Social Justice, Advocacy, Research, Interactive Learning, Policy Analysis
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Threat Detection, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Encryption, Cyber Threat Intelligence, Incident Management, Information Systems Security, Threat Management
Workday
Skills you'll gain: Workday (Software), Security Controls, Business Process, Workflow Management, Business Reporting, Human Resources Software, System Configuration, Role-Based Access Control (RBAC), Organizational Structure
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Software Design, Programming Principles, Debugging, Program Development, C (Programming Language), Software Development Methodologies
Stanford University
Skills you'll gain: Pharmaceuticals, Health Systems, Healthcare Industry Knowledge, Health Care, Health Care Administration, Health Care Procedure and Regulation, Medicare, Quality Improvement, Quality Assessment, Performance Measurement, Regulatory Affairs, Payment Systems, Financial Systems, Insurance, Billing Systems, Business Ethics, Ethical Standards And Conduct
Kennesaw State University
Skills you'll gain: Network Security, Security Management, Firewall, Cyber Attacks, Network Monitoring, Cybersecurity, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, Continuous Monitoring, TCP/IP, Intrusion Detection and Prevention, Threat Detection, Mobile Security, Cryptography, Encryption
- Status: Free
University of Virginia
Skills you'll gain: Branding, Brand Strategy, Brand Management, Safety and Security, Digital Assets, Personal Development, Social Media, Personally Identifiable Information, Self-Awareness, Social Media Strategy
Google Cloud
Skills you'll gain: Cloud Management, Serverless Computing, Google Cloud Platform, Digital Transformation, Data Governance, Cloud Services, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Cloud Infrastructure, Data Strategy, Artificial Intelligence and Machine Learning (AI/ML), Application Programming Interface (API), Real Time Data, Business Transformation, Data Management, Hybrid Cloud Computing, Data Warehousing, Artificial Intelligence, Cloud Computing, Data Security
In summary, here are 10 of our most popular security control implementation courses
- Introduction to User Experience Design : Georgia Institute of Technology
- Geographic Information Systems (GIS): University of California, Davis
- Cryptography I: Stanford University
- The Arts and Science of Relationships: Understanding Human Needs: University of Toronto
- Introduction to International Criminal Law: Case Western Reserve University
- Cybersecurity Operations Fundamentals: Cisco Learning and Certifications
- Workday Basics Series: Workday
- Principles of Secure Coding: University of California, Davis
- Introduction to Healthcare: Stanford University
- Managing Network Security: Kennesaw State University