Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "federal information security management act"
Status: NewPearson
Skills you'll gain: Responsible AI, LangChain, Threat Modeling, Generative AI, Application Security, Secure Coding, Large Language Modeling, Open Web Application Security Project (OWASP), Security Testing, Security Controls, Prompt Engineering, Data Security, Vulnerability Assessments, Computer Security
Status: NewStatus: PreviewUniversitat Politècnica de València
Skills you'll gain: Cybersecurity, Cyber Attacks, Computer Security Awareness Training, Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Security Awareness, Data Security, Personally Identifiable Information, Email Security, Cyber Risk, Malware Protection, General Data Protection Regulation (GDPR), Information Privacy, Multi-Factor Authentication, Identity and Access Management
Status: Free TrialUniversity of Minnesota
Skills you'll gain: Cybersecurity, Cloud Computing, Information Technology, Technology Solutions, Technology Strategies, IT Infrastructure, Data Security, Information Systems, Mobile Security, Emerging Technologies, Innovation, Business Transformation, Blockchain, Encryption, Wireless Networks, Virtualization, Scalability
Status: Free TrialSkills you'll gain: Azure Active Directory, Active Directory, Regulatory Compliance, Microsoft Azure, Security Controls, Identity and Access Management, Security Information and Event Management (SIEM), Generative AI, Cloud Security, Data Governance, Authentications, Network Security, Role-Based Access Control (RBAC), Data Security, Scenario Testing, Threat Detection, Multi-Factor Authentication
Status: NewStatus: Free TrialSkills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Network Troubleshooting, Anomaly Detection, Information Systems Security, Cyber Security Policies, Network Analysis
Status: Free TrialEC-Council
Skills you'll gain: Network Security, Mobile Security, Public Key Infrastructure, Cryptography, Security Controls, Cybersecurity, Authorization (Computing), Encryption, Identity and Access Management, Wireless Networks, Cloud Computing, Cloud Security, Network Monitoring, Data Security, Internet Of Things, Virtualization and Virtual Machines
Status: PreviewGoogle Cloud
Skills you'll gain: User Accounts, Mobile Security, Cloud Computing, Security Controls, Identity and Access Management, Cloud Security, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Role-Based Access Control (RBAC), System Configuration, Multi-Factor Authentication, Data Loss Prevention
Status: NewStatus: PreviewUniversitat Politècnica de València
Skills you'll gain: SQL, Data Integrity, Database Management, Relational Databases, Database Systems, Databases, Query Languages, Database Design, Web Applications, Application Security, Server Side, Data Manipulation
Status: NewGoogle Cloud
Skills you'll gain: Network Security, Cloud Security, Network Planning And Design, Identity and Access Management, Continuous Monitoring, Payment Card Industry (PCI) Data Security Standards, Firewall, Security Controls, Data Loss Prevention, Role-Based Access Control (RBAC), Data Security, Virtual Private Networks (VPN), Cloud Computing Architecture, CI/CD, Key Management, Encryption
Status: NewStatus: PreviewStarweaver
Skills you'll gain: Electronic Discovery, Investigation, Criminal Investigation and Forensics, Incident Response, Cyber Threat Intelligence, Technical Communication, Computer Security Incident Management, Report Writing, Cybersecurity, Fraud detection, Legal Proceedings, Law, Regulation, and Compliance, Document Management, Ethical Standards And Conduct, Business Ethics, Compliance Reporting, Cryptography, Data Collection, Analysis, Management Reporting
Status: Free TrialSkills you'll gain: Data Store, Extract, Transform, Load, Data Architecture, Data Pipelines, Big Data, Data Warehousing, Data Governance, Apache Hadoop, Relational Databases, Apache Spark, Data Lakes, Databases, SQL, NoSQL, Data Security, Data Science

Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Infrastructure as Code (IaC), Command-Line Interface, Amazon CloudWatch, AWS CloudFormation, Root Cause Analysis, Amazon DynamoDB, Customer Relationship Building, Network Troubleshooting, Amazon Web Services, Customer Relationship Management, Software Architecture, IT Automation, Linux Commands, Cloud Computing, Linux, Web Applications, Information Technology, Customer Service, Software Development
In summary, here are 10 of our most popular federal information security management act courses
- Securing Generative AI: Pearson
- Cybersecurity basics for everyone: Universitat Politècnica de València
- IT Infrastructure and Emerging Trends: University of Minnesota
- Microsoft SC-900 Exam Preparation and Practice: Microsoft
- IBM Ethical Hacking with Open Source Tools: IBM
- Network Defense Essentials (NDE): EC-Council
- Introduction to Cloud Identity: Google Cloud
- Introduction to SQL and relational databases: Universitat Politècnica de València
- Préparer la certification PCSE: Google Cloud
- Legal and Ethical Cyber Investigations : Starweaver










