Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security+operations"
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Infrastructure Security, Firewall, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing, System Configuration
University of California, Irvine
Skills you'll gain: Systems Development, Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Safety and Security, Information Technology, Information Privacy, Computer Security Awareness Training, Technology Strategies, Data Management, Digital Communications
University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geospatial Information and Technology, Encryption, Data Security, Network Security, Information Systems Security, Public Key Infrastructure, Wireless Networks, Extensible Languages and XML
Skills you'll gain: Remote Access Systems, Threat Detection, Information Technology Operations, Wireless Networks, Network Security, Mobile Security, Information Systems Security, Virtual Private Networks (VPN), General Networking, Cybersecurity, Network Administration, Network Troubleshooting, Document Management, Data Security, Malware Protection, Augmented and Virtual Reality (AR/VR), Emerging Technologies, Change Control, Encryption, Multi-Factor Authentication
Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Computer Security Incident Management, Data Security, Vulnerability Assessments, Application Security, Threat Detection, Cybersecurity, Security Controls, Security Requirements Analysis, Continuous Monitoring, Cyber Security Assessment, Security Software, Security Strategy, Telecommuting, Infrastructure Security, Cyber Security Policies
Board Infinity
Skills you'll gain: Threat Detection, Cybersecurity, Incident Response, Computer Security Incident Management, Network Security, Cyber Security Strategy, Cyber Security Policies, Intrusion Detection and Prevention, Information Systems Security, Threat Management, Continuous Monitoring, Data Ethics, Security Controls, Security Information and Event Management (SIEM), Firewall, Endpoint Security, System Configuration, Malware Protection, Network Analysis
Kennesaw State University
Skills you'll gain: Cyber Governance, Risk Management Framework, Risk Analysis, Risk Management, Threat Management, Business Risk Management, Cyber Risk, Security Management, Cybersecurity, Cyber Security Strategy, Security Strategy, Asset Management, Information Technology, Business Leadership
New York University
Skills you'll gain: Cyber Attacks, Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cybersecurity, IT Security Architecture, Cloud Security, NIST 800-53, Cyber Threat Intelligence, Hybrid Cloud Computing, Cloud Computing Architecture, Payment Card Industry (PCI) Data Security Standards, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Data Integrity
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Data Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Cloud Computing
LearnQuest
Skills you'll gain: Continuous Monitoring, Cloud Security, Disaster Recovery, Network Security, Cloud Services, Security Strategy, Security Controls, Cloud Computing Architecture, Cloud Computing, Hybrid Cloud Computing, Infrastructure Security, Cybersecurity, Data Security, Security Management, Threat Detection, Identity and Access Management
Skills you'll gain: Microsoft Azure, Identity and Access Management, Network Security, Cloud Security, Azure Active Directory, Security Management, Security Information and Event Management (SIEM), Firewall, Continuous Monitoring, Key Management, Incident Response, Threat Detection, Virtual Machines
University of Colorado Boulder
Searches related to security+operations
In summary, here are 10 of our most popular security+operations courses
- Palo Alto Networks Cybersecurity Foundation: Palo Alto Networks
- Data, Security, and Privacy: University of California, Irvine
- Advanced System Security Topics: University of Colorado System
- Advanced Networking, Security, and IT Operations: Packt
- Identifying and Managing Security Gaps for Remote Teams: LearnQuest
- Cisco Cybersecurity Operations Essentials: Board Infinity
- Implementing a Risk Management Framework : Kennesaw State University
- Enterprise and Infrastructure Security: New York University
- AWS: Threat Detection, Logging and Monitoring: Whizlabs
- Securing Cloud and Hybrid Networks: LearnQuest