Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cybersecurity+controls"
Palo Alto Networks
Skills you'll gain: Network Security, Cloud Security, Cyber Operations, DevSecOps, Cybersecurity, Cloud-Native Computing, Endpoint Detection and Response, Cyber Attacks, General Networking, TCP/IP, Zero Trust Network Access, Cryptography, Endpoint Security, Cyber Threat Intelligence, Malware Protection, Cloud Platforms, Firewall, Cloud Computing, Encryption, Security Information and Event Management (SIEM)
Kennesaw State University
Skills you'll gain: Internet Of Things, Cybersecurity, Cyber Security Strategy, Cyber Security Policies, Mobile Security, Security Awareness, Wireless Networks, Information Privacy, Emerging Technologies, Cyber Security Assessment, Enterprise Security, Embedded Software, Risk Management Framework
University of Colorado System
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Risk Management, Enterprise Security, Cyber Security Assessment, Vulnerability Assessments, Encryption, Network Security, Data Security, Cryptography, Security Awareness, Information Assurance
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Cryptographic Protocols, Data Security, Email Security, Computer Security Awareness Training, Advanced Encryption Standard (AES), Security Awareness, Key Management, Secure Coding, Technical Support and Services, Information Technology, Cyber Security Strategy
Microsoft
Skills you'll gain: Virtual Private Networks (VPN), Cybersecurity, Multi-Factor Authentication, Authentications, Information Systems Security, Network Security, Technical Support and Services, Information Privacy, Servers, Cloud Computing, Cloud Security, Network Administration, Encryption, Identity and Access Management, Mac OS
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Information Systems Security, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Personally Identifiable Information, Cloud Security
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
Skills you'll gain: MITRE ATT&CK Framework, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Operations, IT Automation, Scripting, Python Programming
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Security Strategy, Risk Management Framework, Security Controls, Enterprise Security, Information Privacy
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
Infosec
Skills you'll gain: NIST 800-53, Security Controls, Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security, Personally Identifiable Information, Configuration Management, Change Control
In summary, here are 10 of our most popular cybersecurity+controls courses
- Palo Alto Networks Cybersecurity: Palo Alto Networks
- Cybersecurity and the Internet of Things: Kennesaw State University
- Introduction to Cybersecurity for Business: University of Colorado System
- Cybersecurity Fundamentals: IBM
- Cybersecurity and Privacy: Microsoft
- Cyber Security in Manufacturing : University at Buffalo
- Introduction to Cyber Security: New York University
- Introduction to Python for Cybersecurity : Infosec
- The GRC Approach to Managing Cybersecurity: Kennesaw State University
- Cyber Security – Technology and Governance: Royal Holloway, University of London