Filter by
The language used throughout the course, in both instruction and assessments.
Results for "managing+security+operations"
New York Institute of Finance
Skills you'll gain: Operational Risk, Risk Management Framework, Risk Management, Business Risk Management, Risk Modeling, Enterprise Risk Management (ERM), Risk Appetite, Risk Control, Governance, Risk Analysis, Key Performance Indicators (KPIs), Business Process, Regulatory Requirements, Analysis
University of Colorado System
Skills you'll gain: Linux Administration, Linux, Linux Servers, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Server Administration, Authorization (Computing), Network Administration, Information Systems Security, Authentications
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
University of Colorado System
Skills you'll gain: Windows Servers, Authorization (Computing), Microsoft Windows, Authentications, User Accounts, Group Policy, Security Controls, Active Directory, Identity and Access Management, Software Installation, Servers, Encryption, Network Planning And Design, Network Performance Management
University of Colorado System
Skills you'll gain: Computer Security, OSI Models, Systems Administration, Virtualization, Network Security, Information Technology, Information Systems Security, Enterprise Security, General Networking, Network Administration, Information Systems, Computer Networking, Virtual Machines, Computer Systems, Data Integrity
Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Multi-Factor Authentication, Public Key Infrastructure, Mobile Security, Wireless Networks
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Cyber Governance, Risk Mitigation, Vendor Management, Risk Modeling, Threat Management, Vulnerability Assessments, Security Management, Cyber Risk, Compliance Management, Regulatory Compliance, Cyber Security Policies, Security Awareness, Cyber Security Strategy
Skills you'll gain: Cyber Governance, Security Strategy, Security Management, Incident Management, Cyber Security Strategy, Business Continuity Planning, IT Security Architecture, Computer Security Incident Management, Business Continuity, Cyber Security Policies, Disaster Recovery, IT Management, Cybersecurity, Contingency Planning, Governance, Cyber Risk, Asset Management, Cyber Security Assessment, Information Assurance, Risk Analysis
Kennesaw State University
Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Cyber Threat Intelligence, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Risk Modeling
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Cyber Operations, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Threat Management
Infosec
Skills you'll gain: Risk Management Framework, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cyber Risk, Security Management, Continuous Monitoring, Law, Regulation, and Compliance, Cyber Security Policies, Security Controls, Authorization (Computing)
Skills you'll gain: Security Information and Event Management (SIEM), Splunk, Threat Detection, System Monitoring, Cybersecurity, Event Monitoring, Continuous Monitoring, Incident Response, Data Analysis Software, Data Management, Data Storage, Software Installation, Query Languages, User Interface (UI)
In summary, here are 10 of our most popular managing+security+operations courses
- Operational Risk Management: Frameworks & Strategies: New York Institute of Finance
- Linux Server Management and Security: University of Colorado System
- Security Concepts and Practices: ISC2
- Windows Server Management and Security: University of Colorado System
- Enterprise System Management and Security : University of Colorado System
- Introduction to IT Security: Akamai Technologies, Inc.
- Introduction to Cybersecurity & Risk Management: University of California, Irvine
- Cybersecurity Leadership and Management: Infosec
- Cybersecurity Risk Management Frameworks: Kennesaw State University
- In the Trenches: Security Operations Center : EC-Council