Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security awareness and training program execution"
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
- Status: Free
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Endpoint Detection and Response, Security Information and Event Management (SIEM), Automation, Event Monitoring, Cyber Threat Hunting, Continuous Monitoring, Security Management, Anomaly Detection, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML)
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Record Keeping, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
Skills you'll gain: Istio, Open Web Application Security Project (OWASP), Software Development Life Cycle, Linux Commands, Unit Testing, Application Deployment, NoSQL, Kubernetes, Bash (Scripting Language), MongoDB, Shell Script, Django (Web Framework), Object-Relational Mapping, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Jupyter, Grafana
Skills you'll gain: Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Network Monitoring, Cloud Computing Architecture, Containerization, Network Architecture, Role-Based Access Control (RBAC), Network Security, OAuth, Cloud Storage, Network Routing, Cloud Security, Virtual Private Networks (VPN)
Skills you'll gain: Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix Shell, Query Languages, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
University of California, Davis
Skills you'll gain: Search Engine Optimization, Persona Development, Web Analytics and SEO, Content Creation, Social Media Strategy, Competitive Analysis, Target Audience, Content Marketing, Peer Review, Social Media, Content Strategy, Google Analytics, Presentations, Forecasting, Expectation Management, Campaign Management, User Research, Digital Marketing, Relationship Management, Marketing Strategy and Techniques
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Encryption
Skills you'll gain: Program Management, Project Closure, Stakeholder Management, Project Schedules, Project Management Life Cycle, Project Controls, Stakeholder Communications, Project Management Office (PMO), Risk Analysis, Risk Management, Benefits Administration, Project Management, Governance, Project Risk Management, Organizational Strategy, Strategic Communication, Quality Management, Resource Management, Project Management Institute (PMI) Methodology, Communication Strategies
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Visualization, Statistical Programming, Ggplot2, Dimensionality Reduction, Data Visualization Software, Data Integration, Knitr, Data Analysis, Data Import/Export, General Science and Research, Data Sharing, Statistical Reporting
Skills you'll gain: System Configuration, Configuration Management, Cybersecurity, Security Awareness, Data Security, Security Controls, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Information Technology Operations, System Monitoring, Key Management, General Networking, Data Integrity
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Google Sheets, Business Analytics, Spreadsheet Software, Analytical Skills, Data Sharing, Data Cleansing, Data Processing, Data Strategy, Data Visualization Software, SQL
In summary, here are 10 of our most popular security awareness and training program execution courses
- ISC2 Systems Security Certified Practitioner (SSCP): ISC2
- Automated Cyber Security Incident Response: EDUCBA
- Sound the Alarm: Detection and Response: Google
- IBM Back-End Development: IBM
- Preparing for Google Cloud Certification: Cloud Security Engineer: Google Cloud
- Tools of the Trade: Linux and SQL: Google
- Search Engine Optimization (SEO): University of California, Davis
- Assets, Threats, and Vulnerabilities: Google
- Program Management Professional PMI-PgMP® Certification Prep: LearnKartS
- Data Science: Foundations using R: Johns Hopkins University