Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security control implementation"
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cybersecurity, Security Management, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Cyber Attacks, Malware Protection, Email Security, Vulnerability Management, Artificial Intelligence
DeepLearning.AI
Skills you'll gain: Data Pipelines, Data Architecture, Requirements Analysis, Amazon Web Services, Data Infrastructure, Data Warehousing, Database Design, System Requirements, Performance Tuning, Security Controls, Cloud Computing, Data Transformation, Real Time Data, Scalability
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Application Development, Linux Commands, TCP/IP, General Networking, Scripting, MySQL, Data Structures
Skills you'll gain: Power BI, Dashboard, SQL, Microsoft SQL Servers, Business Intelligence, Data Security, Data Analysis, Data Visualization Software, Data Modeling, Data Management, Data-Driven Decision-Making
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Threat Management, Malware Protection, Healthcare Industry Knowledge, Encryption, Data Security, Information Privacy, General Data Protection Regulation (GDPR), Digital Communications
Universidad de los Andes
Skills you'll gain: Scope Management, Project Scoping, Feasibility Studies, Work Breakdown Structure, Project Estimation, Requirements Management, Project Controls, Cost Estimation, Project Management, Cost Management, Estimation, Project Management Life Cycle, Project Portfolio Management, Project Schedules, Milestones (Project Management), Strategic Planning, Crisis Management, Earned Value Management, Problem Management, Project Documentation
University of Colorado Boulder
Skills you'll gain: Field-Programmable Gate Array (FPGA), Hardware Design, Electronic Hardware, Electronic Systems, Embedded Systems, Application Specific Integrated Circuits, Electrical and Computer Engineering, Computer Architecture, Schematic Diagrams, Technical Design, System Design and Implementation, Computational Logic, Hardware Architecture, Design Software, Verification And Validation, Prototyping, Simulation and Simulation Software, Graphical Tools, Debugging
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
Qualcomm Academy
Skills you'll gain: Wireless Networks, Emerging Technologies, Internet Of Things, General Networking, Digital Communications, Data Security, Network Architecture, Technology Strategies, Network Security, Network Planning And Design, Network Infrastructure, Computer Networking, Virtualization
Skills you'll gain: Data Storytelling, Business Metrics, Key Performance Indicators (KPIs), Data Cleansing, Data Modeling, Analytics, Data Analysis, Data Visualization, Data Validation, Exploratory Data Analysis, Data Quality, Data Manipulation, Generative AI, Data Collection
University of London
Skills you'll gain: jQuery, HTML and CSS, Hypertext Markup Language (HTML), Responsive Web Design, Bootstrap (Front-End Framework), Web Design, Web Development, Javascript, Cascading Style Sheets (CSS), Scripting, Scripting Languages, Programming Principles
DeepLearning.AI
Skills you'll gain: Tensorflow, Deep Learning, Keras (Neural Network Library), Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Network Model, Network Architecture, Machine Learning
In summary, here are 10 of our most popular security control implementation courses
- Cybersecurity Case Studies and Capstone Project: IBM
- Introduction to Data Engineering: DeepLearning.AI
- Akamai Network Engineering: Akamai Technologies, Inc.
- Deploy and Maintain Power BI Assets and Capstone project: Microsoft
- Cybersecurity in Healthcare (Hospitals & Care Centres): Erasmus University Rotterdam
- Programa Especializado en Gerencia de Proyectos Complejos: Universidad de los Andes
- Introduction to FPGA Design for Embedded Systems: University of Colorado Boulder
- Incident Response and Digital Forensics: IBM
- 5G for Everyone: Qualcomm Academy
- Introduction to Data Analytics: Meta