Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "federal information security management act"
Skills you'll gain: IT Service Management, Cloud Computing, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Computer Security Incident Management, Cloud Security, Operating Systems, Endpoint Detection and Response, Cyber Risk, Data Ethics, Cyber Governance
- Status: New AI skills
Google
Skills you'll gain: Threat Modeling, Network Security, Threat Management, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Attacks, Cybersecurity, Network Protocols, Cloud Security, Vulnerability Assessments, Network Architecture, Bash (Scripting Language), Operating Systems, Security Controls, Debugging, Python Programming
Skills you'll gain: Identity and Access Management, IT Security Architecture, Authentications, Business Continuity Planning, Continuous Monitoring, Security Controls, Secure Coding, Security Testing, Cryptography, Disaster Recovery, Vulnerability Assessments, Cyber Security Assessment, Incident Response, Application Security, Incident Management, Security Engineering, Data Security, Network Security, OSI Models, Data Loss Prevention
Skills you'll gain: Network Security, Information Systems Security, Cybersecurity, Application Security, Encryption, Security Controls, Cyber Attacks, Security Awareness, Data Security, Cryptography, Threat Modeling, Security Management, Network Administration, Computer Security Awareness Training, Information Assurance, Wireless Networks, Hardening, Firewall, Malware Protection, Authentications
Kennesaw State University
Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Cyber Security Strategy, Security Awareness, Security Management
- Status: New AI skills
Skills you'll gain: Quality Management, Project Management Life Cycle, Project Scoping, Project Closure, Project Management, Project Planning, Continuous Improvement Process, Agile Project Management, Project Controls, Backlogs, Quality Assessment, Team Management, Project Documentation, Agile Methodology, Communication Planning, Project Schedules, Change Management, Milestones (Project Management), Organizational Structure, Data Storytelling
What brings you to Coursera today?
Kennesaw State University
Skills you'll gain: Network Security, Incident Response, Network Administration, Vulnerability Management, Cybersecurity, Contingency Planning, Cyber Governance, Cyber Attacks, Disaster Recovery, Computer Security Incident Management, Cyber Security Policies, Security Management, Firewall, Network Monitoring, Cyber Security Strategy, General Networking, Crisis Management, Vulnerability Assessments, Cyber Security Assessment, Risk Management
Skills you'll gain: Usability Testing, New Product Development, Product Management, Product Lifecycle Management, Agile Software Development, Product Development, Innovation, Product Roadmaps, Agile Methodology, Kanban Principles, Product Planning, Product Strategy, Product Testing, Project Management Life Cycle, Agile Project Management, User Story, Stakeholder Engagement, Sprint Retrospectives, Stakeholder Management, Competitive Analysis
- Status: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Threat Management, Vulnerability Scanning, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Audit Planning, Systems Development Life Cycle, Software Development Life Cycle, Auditing, Information Assurance, Internal Controls, Information Systems Security, Compliance Auditing, Risk Management, Security Controls, Change Management, System Implementation, Risk Analysis
Skills you'll gain: Threat Management, Cybersecurity, Risk Management Framework, Risk Management, Business Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Open Web Application Security Project (OWASP), Auditing
Amazon Web Services
Skills you'll gain: Amazon Web Services, Web Applications, Cloud Services, Amazon Elastic Compute Cloud, Information Technology, Cloud Computing, Public Cloud, IT Infrastructure, Computer Systems, Amazon S3, Web Development, General Networking, Web Servers, Operating Systems, Servers, Virtualization, Data Centers, Hypertext Markup Language (HTML), Computer Hardware
In summary, here are 10 of our most popular federal information security management act courses
- IT Fundamentals for Cybersecurity: IBM
- Google Cybersecurity: Google
- CISSP Certified Information Systems Security Professional: Packt
- IT Security: Defense against the digital dark arts : Google
- Cybersecurity Risk Management Frameworks: Kennesaw State University
- Google Project Management:: Google
- Managing Cybersecurity: Kennesaw State University
- IBM Product Manager: IBM
- Microsoft Cybersecurity Analyst: Microsoft
- Information Systems Auditing, Controls and Assurance: The Hong Kong University of Science and Technology