Filter by
The language used throughout the course, in both instruction and assessments.
Results for "analyzing+firewall+logs+and+configuring+security+controls"
University of Colorado System
Skills you'll gain: Windows Servers, Authorization (Computing), Microsoft Windows, Authentications, User Accounts, Group Policy, Security Controls, Active Directory, Identity and Access Management, Software Installation, Servers, Encryption, Network Planning And Design, Network Performance Management
Skills you'll gain: OSI Models, Network Security, Security Controls, Wireless Networks, Network Protocols, Firewall, Network Administration, TCP/IP, Proxy Servers, Distributed Denial-Of-Service (DDoS) Attacks, Network Infrastructure, Network Architecture, Network Monitoring, Authentications, Identity and Access Management
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
Fortinet, Inc.
Skills you'll gain: Network Troubleshooting, Firewall, Network Monitoring, Network Security, Network Administration, Virtual Private Networks (VPN), Security Engineering, Network Performance Management, Lightweight Directory Access Protocols, System Monitoring, Authentications, System Configuration, Malware Protection, Debugging
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Cryptography, Security Engineering, Threat Modeling, Authorization (Computing), Encryption, Email Security, Data Integrity, Authentications, Verification And Validation
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Security Strategy, Risk Management Framework, Security Controls, Enterprise Security, Information Privacy
Fortinet, Inc.
Skills you'll gain: Event Monitoring, Network Administration, Security Information and Event Management (SIEM), Threat Management, Systems Administration, Network Security, Security Management, System Monitoring, System Configuration, Cybersecurity, Data Security, Multi-Factor Authentication
University of Colorado System
Skills you'll gain: TCP/IP, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, Network Routing, Computer Networking, Software-Defined Networking, Virtualization
University of California, Irvine
Skills you'll gain: Cyber Governance, Threat Management, Security Management, Cyber Risk, Compliance Management, Risk Management, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Information Assurance, Program Standards, Computer Security
Cisco Learning and Certifications
Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Information Systems Security, Cybersecurity, Network Security, Security Information and Event Management (SIEM), Network Monitoring, Information Assurance, Network Analysis, Intrusion Detection and Prevention, Event Monitoring, Data Capture, Data Integrity, Network Troubleshooting, Incident Response
LearnQuest
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Security Strategy, Cloud Security, Disaster Recovery, Threat Management, Firewall, Network Security, Cybersecurity, Cloud Services, Security Information and Event Management (SIEM), Network Monitoring, Security Controls, Cloud Computing Architecture, Infrastructure Security
In summary, here are 10 of our most popular analyzing+firewall+logs+and+configuring+security+controls courses
- Windows Server Management and Security: University of Colorado System
- Network and Communications Security : ISC2
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- Security Concepts and Practices: ISC2
- Network Security Support Engineer: Fortinet, Inc.
- Design and Analyze Secure Networked Systems: University of Colorado System
- The GRC Approach to Managing Cybersecurity: Kennesaw State University
- FortiAnalyzer Administrator: Fortinet, Inc.
- TCP/IP and Advanced Topics: University of Colorado System
- Security Governance & Compliance: University of California, Irvine