Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security+report+writing"
Skills you'll gain: Cloud Security, Security Management, Data Management, Records Management, Cloud Computing Architecture, Data Security, General Data Protection Regulation (GDPR), Cloud Computing, Data Governance, Personally Identifiable Information, Information Privacy, Threat Detection, Microsoft Azure, Cybersecurity, Security Controls
Google Cloud
Skills you'll gain: Single Sign-On (SSO), Lightweight Directory Access Protocols, Google Workspace, Cloud Security, Application Security, Threat Detection, Application Programming Interface (API), Authentications, Security Management, Multi-Factor Authentication, Identity and Access Management, User Accounts
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, Application Security, IT Security Architecture, Infrastructure Security, Cryptography, Regulation and Legal Compliance, Bash (Scripting Language), Encryption, Authorization (Computing), Risk Management, Virtualization
Infosec
Skills you'll gain: C (Programming Language), C++ (Programming Language), Secure Coding, Application Security, System Programming, Debugging, Security Engineering, Vulnerability Assessments
- Status: Free
Ball State University
Skills you'll gain: Application Security, Cryptography, Authentications, Encryption, Cybersecurity, Information Systems Security, Email Security, Network Security, Advanced Encryption Standard (AES), Data Encryption Standard, Secure Coding, Application Development, Key Management, Public Key Infrastructure, Network Protocols, Data Integrity
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Linux, Linux Administration, Network Security, Role-Based Access Control (RBAC), Identity and Access Management, Linux Commands, Network Monitoring, System Monitoring, Network Administration, Hardening, Continuous Monitoring, Information Systems Security, Security Controls, Wireless Networks, Firewall, Penetration Testing, Cybersecurity, Threat Detection
Skills you'll gain: PostgreSQL, Data Maintenance, Database Administration, Database Architecture and Administration, SQL, Database Systems, Disaster Recovery, Secure Coding, Database Management, Relational Databases, Query Languages, Security Controls, Data Access, Data Security, Role-Based Access Control (RBAC), Threat Management, Threat Detection
Skills you'll gain: Cryptography, Data Security, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Secure Coding, Public Key Infrastructure, Security Controls, Authentications, Key Management, Identity and Access Management, Web Development, Application Security, Web Applications, Data Integrity, Multi-Factor Authentication
Skills you'll gain: Incident Management, Incident Response, Security Management, Computer Security Incident Management, Continuous Monitoring, Infrastructure Security, Cybersecurity, Cyber Security Policies, Remote Access Systems, Telecommuting, Cyber Security Assessment, Security Strategy, Employee Engagement, Technology Roadmaps
Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, Security Controls, Cloud Security, Encryption, Data Security, Information Assurance, Cybersecurity, Identity and Access Management, Cloud Computing, Penetration Testing, Personally Identifiable Information, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Incident Management
Johns Hopkins University
Skills you'll gain: Email Security, Malware Protection, Mobile Security, Cybersecurity, Network Security, Internet Of Things, Open Web Application Security Project (OWASP), Network Monitoring, Security Controls, TCP/IP, Threat Detection, Network Analysis, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Border Gateway Protocol, Infrastructure Security, Application Security, Information Systems Security, Threat Modeling, Network Routing
Skills you'll gain: Security Testing, Vulnerability Assessments, Cyber Security Assessment, Vulnerability Scanning, Penetration Testing, Threat Modeling, Security Controls, Test Planning, Simulations
In summary, here are 10 of our most popular security+report+writing courses
- Cybersecurity Planning, Management, and Compliance: Microsoft
- Google Workspace Security - Español: Google Cloud
- Cyber Security Technologies: Illinois Tech
- C++ Lab Content: Infosec
- CS 647: Cybersecurity and Secure Software Design. (2024): Ball State University
- Linux for Security Experts: Codio
- SQL for Security Specialist: Codio
- Data Security for Web Developers: Codio
- Incident Management and Continuous Improvement: LearnQuest
- Protection of Information Assets: Packt