Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security+audits"
Skills you'll gain: Endpoint Security, Application Security, Cloud Security, Cyber Attacks, Cybersecurity, Malware Protection, Information Systems Security, Security Awareness, Data Security, Cloud Computing, Network Security, Threat Detection, Encryption, Virtualization, Data Ethics
Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Security Controls, Vulnerability Assessments, Incident Response, Intrusion Detection and Prevention, Malware Protection, Network Architecture
Microsoft
Skills you'll gain: Virtual Private Networks (VPN), Cybersecurity, Multi-Factor Authentication, Authentications, Information Systems Security, Network Security, Technical Support and Services, Information Privacy, Servers, Cloud Computing, Cloud Security, Network Administration, Encryption, Identity and Access Management, Mac OS
University of Colorado System
Skills you'll gain: Disaster Recovery, Business Continuity Planning, Security Management, System Monitoring, System Implementation, Cyber Security Policies, Compliance Auditing, Systems Administration, Governance, Information Systems Security, Unix, Change Management
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
Skills you'll gain: Cloud Security, Data Management, Cloud Computing Architecture, Records Management, Security Management, Cloud Computing, Microsoft Azure, Threat Management, Disaster Recovery, Security Strategy, Cybersecurity, Data Governance, Information Assurance, Personally Identifiable Information, Security Controls, Information Privacy, General Data Protection Regulation (GDPR), Identity and Access Management
University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
Skills you'll gain: Database Management, Databases, Relational Databases, Data Security, User Accounts, SQL, Stored Procedure, Database Design, Application Security, Threat Modeling, Vulnerability Scanning, Cybersecurity, NoSQL, Data Integrity, Role-Based Access Control (RBAC), Encryption
Skills you'll gain: Security Controls, Security Management, Information Systems Security, Information Assurance, Security Awareness, Data Ethics, Cyber Security Policies, Data Security, Information Privacy, Information Management, Change Control, Configuration Management
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cybersecurity, Threat Management, Security Controls, Threat Detection, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Cyber Security Assessment, Data Security, Network Security, Enterprise Security, Information Assurance, Incident Response, Data Integrity
Skills you'll gain: Data Governance, Systems Development, Data Loss Prevention, Security Testing, Data Migration, Network Security, Database Management, Incident Management, Software Development Life Cycle, Problem Management, Disaster Recovery, Resource Management, Control Objectives for Information and Related Technology (COBIT), Cryptography, IT Management, Compliance Auditing, Governance, Auditing, Test Planning, Risk Control
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Identity and Access Management, Business Risk Management, Security Controls
Searches related to security+audits
In summary, here are 10 of our most popular security+audits courses
- Systems and Application Security: ISC2
- Cybersecurity Assessment: CompTIA Security+ & CYSA+: IBM
- Cybersecurity and Privacy: Microsoft
- Planning, Auditing and Maintaining Enterprise Systems: University of Colorado System
- Security Concepts and Practices: ISC2
- Cybersecurity Management and Compliance: Microsoft
- Cyber Security – Technology and Governance: University of London
- Database Essentials and Vulnerabilities: IBM
- Security Operations and Administration: ISC2
- Cybersecurity Best Practices: Coursera Instructor Network