Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security control implementation"
Johns Hopkins University
Skills you'll gain: Shiny (R Package), Rmarkdown, Exploratory Data Analysis, Regression Analysis, Leaflet (Software), Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Statistical Inference, Predictive Modeling, Statistical Hypothesis Testing, Data Visualization, Plotly, Machine Learning Algorithms, Interactive Data Visualization, Probability & Statistics, Knitr
Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Workflow Management, Stakeholder Engagement, Cyber Operations, Cybersecurity, Stakeholder Management, Security Information and Event Management (SIEM), Incident Response, Security Management, Computer Security Incident Management, Cyber Attacks, Stakeholder Communications, Incident Management, Event Monitoring, Security Controls, Data Security, Customer Relationship Building, Network Security, Team Oriented
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Peripheral Devices, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Cybersecurity, Configuration Management, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Security Awareness, Cloud Platforms
Skills you'll gain: Unified Modeling Language, Systems Engineering, Software Systems, Systems Architecture, Systems Analysis, System Design and Implementation, Systems Integration, Interoperability, Solution Architecture, Requirements Analysis, Verification And Validation, Hardware Architecture
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Visualization, Statistical Programming, Ggplot2, Dimensionality Reduction, Data Visualization Software, Data Integration, Knitr, Data Analysis, Data Import/Export, General Science and Research, Data Sharing, Statistical Reporting
- Status: Free
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), Automation, Event Monitoring, Continuous Monitoring, System Monitoring, Security Management, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML)
Skills you'll gain: Data Ethics, Data Analysis, Data Security, Google Sheets, Databases, Data Storage, Data Quality, Data Integrity, Data Management, Data Collection, Data Manipulation, Relational Databases, SQL, Metadata Management, Unstructured Data
University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Information Assurance, Security Controls, Incident Response
University of Virginia Darden School Foundation
Skills you'll gain: Strategic Thinking, Digital Transformation, Business Strategy, Cloud Computing Architecture, Competitive Analysis, Cloud Services, Business Transformation, Cloud Security, Cloud Infrastructure, Big Data, Cloud Platforms, Data Analysis, Statistical Analysis, Cloud Computing, Artificial Intelligence, Generative AI, Apache Hadoop, OpenAI, Product Lifecycle Management, Business Technologies
Skills you'll gain: Project Scoping, Project Documentation, Project Management Life Cycle, Project Management, Goal Setting, Project Management Software, Stakeholder Management, Cost Benefit Analysis, Resource Allocation, Accountability
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
Skills you'll gain: Istio, Node.JS, Software Development Life Cycle, Server Side, MongoDB, Application Deployment, CI/CD, Cloud-Native Computing, React Redux, NoSQL, Kubernetes, Restful API, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, HTML and CSS, Ajax, Interviewing Skills
In summary, here are 10 of our most popular security control implementation courses
- Data Science: Johns Hopkins University
- Security Operations Center (SOC): Cisco Learning and Certifications
- IBM and ISC2 Cybersecurity Specialist: ISC2
- Introduction to Model-Based Systems Engineering: Siemens
- Data Science: Foundations using R: Johns Hopkins University
- Automated Cyber Security Incident Response: EDUCBA
- Prepare Data for Exploration: Google
- Cyber Security Fundamentals: University of London
- IBM & Darden Digital Strategy: University of Virginia Darden School Foundation
- Project Initiation: Starting a Successful Project: Google