Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "identify+security+risks"
University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, System Monitoring, System Implementation, Systems Administration, Virtualization, Network Security, Linux Commands
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Law, Regulation, and Compliance, Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
Skills you'll gain: Vulnerability Management, Azure Active Directory, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Generative AI, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Single Sign-On (SSO), Microsoft Azure, Security Management, Cyber Security Policies, Identity and Access Management, Data Management, Records Management, Authentications, System Monitoring, Data Ethics, ChatGPT
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Security Testing, Cloud Security, Security Strategy, Information Systems Security, Malware Protection, Vulnerability Assessments, Endpoint Security, Cyber Attacks, Cyber Security Assessment, Security Management
Skills you'll gain: Threat Management, Cybersecurity, Cyber Risk, Computer Security Incident Management, Risk Management Framework, Risk Management, Incident Response, Security Information and Event Management (SIEM), Security Controls, Security Strategy, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), MITRE ATT&CK Framework, Auditing, Compliance Auditing
Skills you'll gain: Network Security, Information Systems Security, Cybersecurity, Application Security, Encryption, Computer Security, Security Controls, Cyber Attacks, Security Awareness, Data Security, Threat Modeling, Security Management, Security Strategy, Information Assurance, Wireless Networks, Hardening, Firewall, Malware Protection, Authentications, Identity and Access Management
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Risk Management Framework, Cyber Governance, Risk Mitigation, Vendor Management, Threat Management, Vulnerability Assessments, Security Management, Cyber Risk, Compliance Management, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Assessment, Security Awareness, Cyber Security Strategy
Skills you'll gain: Stakeholder Communications, Incident Response, Stakeholder Engagement, Computer Security Incident Management, Data Ethics, Cybersecurity, Security Awareness, Incident Management, Data Security, Communication, Asset Protection, Ethical Standards And Conduct, Business Ethics, Interviewing Skills, Professional Networking
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Record Keeping, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Databases, Software Architecture, Secure Coding, Software Design Patterns, Systems Design, Software Engineering, Software Development Tools, Software Development Life Cycle, Technical Design, Security Engineering
Skills you'll gain: Threat Modeling, Vulnerability Assessments, Risk Analysis, Personally Identifiable Information, Risk Management, Risk Control, IT Management, Risk Appetite, Compliance Reporting, Information Technology Architecture, Vulnerability Management, Business Continuity, Business Risk Management, Operational Risk, Information Privacy, Risk Mitigation, Cyber Security Assessment, Threat Management, Information Technology, Security Controls
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Personally Identifiable Information, Identity and Access Management, Encryption
Searches related to identify+security+risks
In summary, here are 10 of our most popular identify+security+risks courses
- Computer Security and Systems Management: University of Colorado System
- Cybersecurity: Developing a Program for Your Business: Kennesaw State University
- Microsoft Azure Cybersecurity Tools and Solutions: Microsoft
- Cybersecurity for Business: University of Colorado System
- Play It Safe: Manage Security Risks: Google
- IT Security: Defense against the digital dark arts : Google
- Introduction to Cybersecurity & Risk Management: University of California, Irvine
- Put It to Work: Prepare for Cybersecurity Jobs: Google
- Sound the Alarm: Detection and Response: Google
- Secure Software Design: University of Colorado System