Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "federal information security management act"
University of Michigan
Skills you'll gain: Team Motivation, Employee Engagement, Team Management, Team Building, Organizational Leadership, Goal Setting, Visionary, Leadership, Cultural Diversity, Constructive Feedback, Performance Appraisal, Communication
Tally Education and Distribution Services Private Limited
Skills you'll gain: Payroll, Payroll Systems, Payroll Administration, Payroll Processing, Payroll Reporting, Income Tax, Human Resources Software, Compensation Management, Tax Compliance, Tax Laws
- Status: Free
Coursera Instructor Network
Skills you'll gain: Stress Management, Positivity, Personal Care, Mindfulness, Behavioral Health, Personal Development, Productivity, Self-Motivation, Self-Awareness, Mental Health, Resilience, Goal Setting, Activities of Daily Living (ADLs)
Skills you'll gain: Paid media, Instagram, Social Media, Social Media Campaigns, Advertising, Digital Advertising, Marketing Materials, Social Media Marketing, Facebook, Copywriting, Content Creation, Marketing, Information Privacy, Target Audience
Skills you'll gain: Order Fulfillment, E-Commerce, Order Processing, Campaign Management, Digital Advertising, Google Ads, Retail Management, Customer Engagement, Marketing Strategies, Market Research, Web Analytics, Trend Analysis, Customer experience strategy (CX), Target Audience
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Cybersecurity, Network Protocols, Computer Networking, Cyber Security Strategy, Computer Architecture, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
Skills you'll gain: Bash (Scripting Language), Unit Testing, Scripting, Unix Shell, Shell Script, Linux Commands, Test Driven Development (TDD), Unix Commands, Unix, Scripting Languages, Development Environment, Operating Systems, Command-Line Interface, File Management, OS Process Management, Automation, Debugging, Python Programming
University of Michigan
Skills you'll gain: Data Processing, Data Collection, Data Visualization Software, Data Manipulation, Python Programming, Exploratory Data Analysis, Algorithms, Data Analysis, Web Scraping, Unstructured Data
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Computer Security Awareness Training, Malware Protection, Risk Management, Vulnerability Assessments, Enterprise Security
Johns Hopkins University
Skills you'll gain: Shiny (R Package), Rmarkdown, Regression Analysis, Leaflet (Software), Exploratory Data Analysis, Statistical Inference, Statistical Hypothesis Testing, Predictive Modeling, Plotly, Machine Learning Algorithms, Interactive Data Visualization, Probability & Statistics, Data Visualization, Statistical Machine Learning, Feature Engineering, Statistical Analysis, Statistical Modeling, Probability, Data Science, Data Analysis
Skills you'll gain: Network Security, Cloud Computing, Network Infrastructure, Microsoft Azure, Cloud Services, Firewall, Computer Networking, Virtualization and Virtual Machines, Digital Transformation, Networking Hardware, Cybersecurity, Network Protocols, Artificial Intelligence and Machine Learning (AI/ML)
Skills you'll gain: Business Intelligence, Data Integration, Stakeholder Engagement, Dashboard, Data Modeling, Business Analytics, Real Time Data, Requirements Elicitation, Data Warehousing, Data-Driven Decision-Making, Data Analysis, Key Performance Indicators (KPIs), Data Pipelines, Project Implementation
In summary, here are 10 of our most popular federal information security management act courses
- Inspiring and Motivating Individuals: University of Michigan
- Payroll & HR Management : Tally Education and Distribution Services Private Limited
- Well Being & Self Care: for Physical and Mental Health: Coursera Instructor Network
- Fundamentals of Social Media Advertising: Meta
- Make the Sale: Build, Launch, and Manage E-commerce Stores: Google
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- Using Python to Interact with the Operating System: Google
- Capstone: Retrieving, Processing, and Visualizing Data with Python: University of Michigan
- Cybersecurity for Business: University of Colorado System
- Data Science: Statistics and Machine Learning: Johns Hopkins University