Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security control implementation"
University of Virginia
Skills you'll gain: Agentic systems, Economics, Artificial Intelligence, Economic Development, Socioeconomics, Behavioral Economics, Automation, Labor Relations, Emerging Technologies, Market Dynamics, Supply And Demand, Policy Analysis, Innovation, Production Process
LearnKartS
Skills you'll gain: Penetration Testing, Network Security, Malware Protection, Threat Modeling, Cybersecurity, Threat Detection, Information Systems Security, Intrusion Detection and Prevention, Firewall, Cyber Attacks, Vulnerability Assessments, Internet Of Things, Network Analysis
Skills you'll gain: React Native, User Research, UI/UX Research, Persona (User Experience), Restful API, Design Research, Android Studio, Version Control, Kotlin, User Experience Design, Android Jetpack, Unix Commands, Android Development, Interaction Design, Git (Version Control System), GitHub, Algorithms, Jest (JavaScript Testing Framework), Usability, Mobile Development
University of Colorado System
Skills you'll gain: Cryptography, Cybersecurity, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Data Integrity
- Status: Free
Skills you'll gain: Software Architecture, Functional Requirement, Requirements Analysis, Internet Of Things, Software Design Patterns, User Requirements Documents, Android Development, Application Frameworks, Maintainability, Interoperability, Software Quality (SQA/SQC)
New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
Skills you'll gain: Vulnerability Assessments, Risk Management, Continuous Monitoring, Operational Risk, Threat Management, Intrusion Detection and Prevention, Business Risk Management, Cyber Risk, Vulnerability Management, Security Controls, Enterprise Risk Management (ERM), Risk Mitigation, Risk Analysis, Compliance Management, Security Information and Event Management (SIEM), Technical Communication
Automatic Data Processing, Inc. (ADP)
Skills you'll gain: Payroll, Payroll Processing, Payroll Systems, Payroll Administration, Payroll Reporting, Data Entry, Employee Onboarding, Compensation Management, Record Keeping, Auditing, Tax Compliance, Timelines, Data Security
Skills you'll gain: Remote Access Systems, Local Area Networks, Software Installation, Command-Line Interface, Microsoft Windows, System Configuration, Threat Detection, Information Technology Operations, Wireless Networks, Network Security, TCP/IP, Mobile Security, Information Systems Security, Linux, Peripheral Devices, USB, Operating Systems, Computer Hardware, Data Storage Technologies, Hardware Troubleshooting
Skills you'll gain: Generative AI, PyTorch (Machine Learning Library), Large Language Modeling, Natural Language Processing, Text Mining, Deep Learning, Applied Machine Learning
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, Prompt Engineering, Project Implementation, Project Documentation, Taking Meeting Minutes, Project Management, Brainstorming, Meeting Facilitation, Scheduling, Management Reporting, Team Oriented
University of California, Irvine
Skills you'll gain: Test Planning, Embedded Software, Embedded Systems, Functional Requirement, Systems Design, Requirements Analysis, System Design and Implementation, Internet Of Things, Prototyping, Computer Hardware
In summary, here are 10 of our most popular security control implementation courses
- The Economics of AI: University of Virginia
- System and Network Security: LearnKartS
- Desarrollador de Meta de Android: Meta
- Classical Cryptosystems and Core Concepts: University of Colorado System
- Software Architecture for the Internet of Things: EIT Digital
- Real-Time Cyber Threat Detection and Mitigation: New York University
- Risk Identification, Monitoring, and Analysis: ISC2
- The Payroll Cycle: Automatic Data Processing, Inc. (ADP)
- CompTIA A+ Certification Core 2 (220-1102): Packt
- Generative AI Language Modeling with Transformers: IBM