Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security+best+practices"
Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, Infrastructure as Code (IaC), Cyber Security Policies, Security Controls, Security Strategy, Identity and Access Management, Threat Detection
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Endpoint Security, Threat Detection, Incident Response
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Threat Modeling, Personally Identifiable Information, Malware Protection, Email Security, Incident Response
Skills you'll gain: NIST 800-53, Risk Management Framework, Cyber Risk, Federal Information Security Management Act, Cybersecurity, Risk Management, Security Management, Cyber Governance, Cyber Security Strategy, Operational Risk, Governance Risk Management and Compliance, Security Controls, Continuous Monitoring, Infrastructure Security, Cyber Security Assessment, Enterprise Risk Management (ERM), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Security Controls, Vulnerability Assessments, Incident Response, Intrusion Detection and Prevention, Malware Protection, Network Architecture
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Application Security, Vulnerability Management, Secure Coding, Cybersecurity, Authorization (Computing), Cryptography, System Configuration, Encryption, Software Design, SQL
University of Colorado System
Skills you'll gain: Windows Servers, Authorization (Computing), Microsoft Windows, Authentications, User Accounts, Group Policy, Security Controls, Active Directory, Identity and Access Management, Software Installation, Servers, Encryption, Network Planning And Design, Network Performance Management
ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Data Security, Cybersecurity, Authentications, Network Security, Data Integrity, Algorithms
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Data Security, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
Microsoft
Skills you'll gain: Virtual Private Networks (VPN), Cybersecurity, Multi-Factor Authentication, Authentications, Information Systems Security, Network Security, Technical Support and Services, Information Privacy, Servers, Cloud Computing, Cloud Security, Network Administration, Encryption, Identity and Access Management, Mac OS
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Identity and Access Management, Private Cloud, Authorization (Computing), Google Cloud Platform, Cloud-Native Computing, Cloud Security, Network Troubleshooting, Network Security, Network Model, User Accounts, Virtual Private Networks (VPN)
In summary, here are 10 of our most popular security+best+practices courses
- Strategies for Cloud Security Risk Management: Google Cloud
- Cybersecurity Solutions and Microsoft Defender: Microsoft
- Cybersecurity Threat Vectors and Mitigation: Microsoft
- Introduction to Cybersecurity Fundamentals: Coursera Instructor Network
- Cybersecurity Risk Management Framework: Infosec
- Cybersecurity Assessment: CompTIA Security+ & CYSA+: IBM
- OWASP Top 10 - Welcome and Risks 1-5: Infosec
- Windows Server Management and Security: University of Colorado System
- Cryptography : ISC2
- Secure Coding Practices: University of California, Davis