Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security control implementation"
University of Michigan
Skills you'll gain: Payment Systems, Payment Processing, Mobile Banking, FinTech, Credit/Debit Card Processing, Point of Sale, Mobile Security, Financial Systems, Banking, Emerging Technologies, Digital Assets
Infosec
Skills you'll gain: File Systems, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Data Security, Information Systems Security, File Management, Network Security, Operating Systems, Data Structures, Data Ethics, General Networking, Data Validation, Record Keeping, Data Storage Technologies, Data Analysis Software, User Accounts, USB, Systems Analysis
University of California, Davis
Skills you'll gain: Spatial Data Analysis, Spatial Analysis, ArcGIS, Geographic Information Systems, Geospatial Mapping, Data Quality, Data Mapping, Data Modeling, Data Storage Technologies, Data Storage, Data Processing, Data Manipulation, Databases
Google - Spectrum Sharing
Skills you'll gain: Public Key Infrastructure, Wireless Networks, Technical Communication, Software Installation, Key Management, Infrastructure Security, Network Infrastructure, System Implementation, Digital Communications, System Configuration, Network Troubleshooting, Record Keeping, Data Entry, Data Validation
University of Leeds
Skills you'll gain: Stakeholder Management, Stakeholder Engagement, Engineering Management, Scope Management, Stakeholder Communications, Risk Management, Project Finance, Project Scoping, Program Management, Project Risk Management, Project Management, Business Risk Management, Enterprise Risk Management (ERM), Governance, Construction Management, Project Controls, Project Management Life Cycle, Project Performance, Contract Management, Project Coordination
- Status: Free
The University of North Carolina at Chapel Hill
Skills you'll gain: Data Sharing, Data Management, File Management, Data Storage, Information Management, Metadata Management, Data Governance, Record Keeping, Data Security, Data Ethics, Information Privacy, Version Control
Google Cloud
Skills you'll gain: Gmail, Google Workspace, Email Security, Business Correspondence, Productivity Software, Organizational Skills, Business Communication, Writing
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Identity and Access Management, Business Risk Management, Security Controls
Johns Hopkins University
Skills you'll gain: Public Safety and National Security, Public Policies, Policy Analysis, Policy Development, Community Development, Social Studies, Law, Regulation, and Compliance, Advocacy, Research
Rice University
Skills you'll gain: Java Programming, Java, Data Structures, System Programming, Programming Principles, OS Process Management, Computer Programming, Object Oriented Programming (OOP), Debugging, Operating Systems, Algorithms
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Data Security, Vulnerability Assessments, Cybersecurity, Security Testing, Software Design, Vulnerability Management, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
University of Illinois Urbana-Champaign
Skills you'll gain: Internet Of Things, Networking Hardware, Network Infrastructure, Network Routers, General Networking, Network Switches, Network Protocols, Network Architecture, Wireless Networks, Network Administration, Infrastructure Security, Local Area Networks, Computer Networking, Emerging Technologies, Data Science, Embedded Systems, Network Planning And Design, Network Security, Distributed Computing, Digital Communications
In summary, here are 10 of our most popular security control implementation courses
- The Future of Payment Technologies: University of Michigan
- Computer Forensics: Infosec
- GIS Data Formats, Design and Quality: University of California, Davis
- Become a CBRS Certified Professional Installer by Google: Google - Spectrum Sharing
- Managing Major Engineering Projects: University of Leeds
- Research Data Management and Sharing: The University of North Carolina at Chapel Hill
- Gmail: Google Cloud
- Tools for Security Specialists: Codio
- Reducing Gun Violence in America: Evidence for Change: Johns Hopkins University
- Concurrent Programming in Java: Rice University