Filter by
The language used throughout the course, in both instruction and assessments.
Results for "identify+security+challenges"
Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cryptography, Security Testing, Cybersecurity, Vulnerability Assessments, Encryption, Technical Writing, Cyber Threat Intelligence, Cyber Attacks
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Encryption, Application Security, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Vulnerability Management, Personally Identifiable Information, Web Applications, SQL
Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, Threat Management, System Testing, Threat Detection, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Windows PowerShell, Command-Line Interface
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Linux, Linux Administration, Network Security, Role-Based Access Control (RBAC), Identity and Access Management, Linux Commands, Network Monitoring, System Monitoring, Network Administration, Hardening, Continuous Monitoring, Information Systems Security, Security Controls, Wireless Networks, Firewall, Penetration Testing, Cybersecurity, Threat Detection
Skills you'll gain: Continuous Monitoring, Business Continuity, ISO/IEC 27001, Security Management, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, Application Security, IT Security Architecture, Infrastructure Security, Cryptography, Regulation and Legal Compliance, Bash (Scripting Language), Encryption, Authorization (Computing), Risk Management, Virtualization
New York University
Skills you'll gain: Cyber Attacks, Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cybersecurity, IT Security Architecture, Cloud Security, NIST 800-53, Cyber Threat Intelligence, Hybrid Cloud Computing, Cloud Computing Architecture, Payment Card Industry (PCI) Data Security Standards, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Data Integrity
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authorization (Computing), Cyber Risk, Authentications, Continuous Monitoring, Threat Management, Security Controls, Application Security, Cybersecurity, Cyber Attacks, Secure Coding, Cryptography, Security Testing, Data Security, Identity and Access Management, Vulnerability Management, Infrastructure Security
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Cryptography, Security Engineering, Threat Modeling, Authorization (Computing), Encryption, Email Security, Data Integrity, Authentications, Verification And Validation
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, Security Engineering, C++ (Programming Language), User Accounts, Data Validation, Debugging, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Data Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Cloud Computing
Arizona State University
Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Security Strategy, Cyber Security Assessment, Security Controls, Incident Response, Data Storage, Vulnerability Assessments, Patch Management
In summary, here are 10 of our most popular identify+security+challenges courses
- Cybersecurity Fundamentals: Johns Hopkins University
- Identifying Security Vulnerabilities: University of California, Davis
- Cybersecurity Testing and Prevention: Microsoft
- Linux for Security Experts: Codio
- Security and Risk Management: Packt
- Cyber Security Technologies: Illinois Tech
- Enterprise and Infrastructure Security: New York University
- Cloud Top Ten Risks: University of Minnesota
- Design and Analyze Secure Networked Systems: University of Colorado System
- Identifying Security Vulnerabilities in C/C++Programming: University of California, Davis