Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security awareness and training program execution"
University of Minnesota
Skills you'll gain: Cloud Security, Application Security, Network Security, Cloud Computing, Cybersecurity, Information Systems Security, Infrastructure Security, Public Key Infrastructure, Cryptography, Private Cloud, Vulnerability Assessments, Virtualization, Virtual Machines, Authentications, Encryption, Authorization (Computing)
University of California, Davis
Skills you'll gain: Persona Development, Search Engine Optimization, Web Analytics and SEO, Target Audience, Google Analytics, Digital Marketing, User Research, Content Strategy, Web Content, Marketing Strategy and Techniques, Social Media Strategy
Skills you'll gain: Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix Shell, Query Languages, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
- Status: Free
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), Automation, Event Monitoring, Continuous Monitoring, System Monitoring, Security Management, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML)
University of Michigan
Skills you'll gain: Data Structures, Python Programming, Data Manipulation, Development Environment, File Management, Data Analysis, Computer Programming, Software Installation
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, ISO/IEC 27001, Computer Security Awareness Training, Cyber Risk, Information Assurance
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Record Keeping, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Information Assurance, Security Controls, Incident Response
Skills you'll gain: Data Ethics, Data Analysis, Data-Driven Decision-Making, Google Sheets, Business Analytics, Spreadsheet Software, Analytical Skills, Data Sharing, Data Cleansing, Data Processing, Data Visualization Software, SQL
Skills you'll gain: Stakeholder Communications, Incident Response, Stakeholder Engagement, Computer Security Incident Management, Data Ethics, Cybersecurity, Security Awareness, Incident Management, Data Security, Communication, Asset Protection, Ethical Standards And Conduct, Business Ethics, Interviewing Skills, Professional Networking
Skills you'll gain: Search Engine Marketing, Search Engine Optimization, Target Audience, Digital Marketing, Persona Development, Web Analytics and SEO, Marketing, Customer Engagement, Customer Acquisition Management, Advertising, Marketing Strategies, Lead Generation
In summary, here are 10 of our most popular security awareness and training program execution courses
- Cloud Security Basics: University of Minnesota
- Introduction to Google SEO: University of California, Davis
- Tools of the Trade: Linux and SQL: Google
- Assets, Threats, and Vulnerabilities: Google
- Automated Cyber Security Incident Response: EDUCBA
- Python Data Structures: University of Michigan
- Security Management and Governance: Royal Holloway, University of London
- Sound the Alarm: Detection and Response: Google
- Cyber Security Fundamentals: University of London
- Foundations: Data, Data, Everywhere: Google