Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security+command+center+(scc)"
Skills you'll gain: Leadership and Management, Operations Management, Security Engineering, System Security, Computer Security Incident Management, Software Security, Strategy and Operations, Network Security, Security Software, Security Strategy
Skills you'll gain: OSI Models, Network Security, Security Controls, Wireless Networks, Network Protocols, Firewall, Network Administration, TCP/IP, Proxy Servers, Distributed Denial-Of-Service (DDoS) Attacks, Network Infrastructure, Network Architecture, Network Monitoring, Authentications, Identity and Access Management
Skills you'll gain: Network Security, Cloud Computing, Network Infrastructure, Microsoft Azure, Firewall, Computer Networking, Virtualization and Virtual Machines, Networking Hardware, Cybersecurity, Network Protocols, Artificial Intelligence and Machine Learning (AI/ML)
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Endpoint Security, Threat Detection, Incident Response
University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, System Monitoring, System Implementation, Systems Administration, Virtualization, Network Security, Linux Commands
Skills you'll gain: Azure Active Directory, Authentications, Identity and Access Management, Authorization (Computing), Active Directory, Role-Based Access Control (RBAC), Multi-Factor Authentication, Single Sign-On (SSO), Software As A Service, User Accounts
University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Usability Testing, Interaction Design, Human Factors, Information Privacy, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, Human Centered Design, Data Sharing, Design
Skills you'll gain: System Configuration, Configuration Management, Cybersecurity, Security Awareness, Data Security, Security Controls, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Information Technology Operations, System Monitoring, Key Management, General Networking, Data Integrity
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Skills you'll gain: Endpoint Security, Application Security, Cloud Security, Cyber Attacks, Cybersecurity, Malware Protection, Information Systems Security, Security Awareness, Data Security, Cloud Computing, Network Security, Threat Detection, Encryption, Virtualization, Data Ethics
Skills you'll gain: Cyber Governance, Security Strategy, Security Management, Incident Management, Cyber Security Strategy, Business Continuity Planning, IT Security Architecture, Computer Security Incident Management, Business Continuity, Disaster Recovery, Cyber Security Policies, IT Management, Cybersecurity, Contingency Planning, Governance, Cyber Risk, Asset Management, Cyber Security Assessment, Information Assurance, Risk Analysis
In summary, here are 10 of our most popular security+command+center+(scc) courses
- Security Operations and Administration: ISC2
- Network and Communications Security : ISC2
- Introduction to Networking and Cloud Computing: Microsoft
- Cybersecurity Solutions and Microsoft Defender: Microsoft
- Computer Security and Systems Management: University of Colorado System
- Cybersecurity Identity and Access Solutions using Azure AD: Microsoft
- Usable Security: University of Maryland, College Park
- Security Operations: ISC2
- Security Concepts and Practices: ISC2
- Cybersecurity Threat Vectors and Mitigation: Microsoft