Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "federal information security management act"
Status: Free TrialSkills you'll gain: Job Control Language (JCL), Mainframe Computing, z/OS, Virtualization, Unix, IBM DB2, IBM Cloud, Data Management, Virtual Machines, Database Management Systems, Hardware Architecture, Data Storage, Operating System Administration, Infrastructure Architecture, System Programming, Operating Systems, Unix Commands, Linux, Control Panels, Command-Line Interface
Status: Free TrialUniversity of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Data Security, Cloud Applications, Cloud Services, Application Security, Authorization (Computing), Cyber Risk, Secure Coding, Cloud Storage, Personally Identifiable Information, DevSecOps, General Data Protection Regulation (GDPR), Network Security, Information Privacy, Cloud Computing, Cybersecurity, Cryptography
Status: NewStatus: Free TrialSkills you'll gain: Cryptography, Encryption, Application Security, Python Programming, Programming Principles, Scripting, Algorithms, Debugging, Data Structures
Status: Free TrialMicrosoft
Skills you'll gain: Network Security, Network Protocols, TCP/IP, Cloud Computing, Firewall, General Networking, Networking Hardware, Network Architecture, OSI Models, Microsoft Azure, Computer Networking, Network Infrastructure, Local Area Networks, Network Monitoring, Software As A Service, Virtual Machines, Virtualization
Status: NewGoogle Cloud
Skills you'll gain: Firewall, Network Security, Threat Detection, Cloud Security, Network Administration, Cloud Computing, Security Controls, Public Cloud

Infosec
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Detection, Threat Management, Threat Modeling, MITRE ATT&CK Framework, Endpoint Detection and Response, Intrusion Detection and Prevention, Security Information and Event Management (SIEM), Anomaly Detection, Generative AI, Endpoint Security, Event Monitoring, System Monitoring, Network Analysis, Linux
Status: PreviewInstitut Mines-Télécom
Skills you'll gain: Wireless Networks, Network Security, Network Architecture, Computer Networking, Network Infrastructure, Mobile Security, Network Protocols, Telecommunications, Digital Communications, Dataflow, Capacity Management
Status: Free TrialSkills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Open Web Application Security Project (OWASP), Vulnerability Assessments, Exploitation techniques, Test Planning
Status: Free TrialGoogle Cloud
Skills you'll gain: Cloud Infrastructure, Identity and Access Management, Google Cloud Platform, Prompt Engineering, Application Deployment, Cloud Storage, Kubernetes, Containerization, Infrastructure As A Service (IaaS), Cloud Computing, CI/CD, Cloud-Native Computing, Terraform, Cloud Applications, Cloud Computing Architecture, Cloud Security, Cloud Services, Load Balancing, Service Level Agreement, Infrastructure as Code (IaC)
Status: Free TrialVanderbilt University
Skills you'll gain: Prompt Engineering, Data Presentation, ChatGPT, Document Management, Artificial Intelligence, Problem Solving, Data Analysis, Information Management, File Management, Creativity, Data Processing, Automation
Status: Free TrialSkills you'll gain: Operating System Administration, Package and Software Management, File Systems, Microsoft Windows, Linux, Operating Systems, OS Process Management, Linux Administration, Remote Access Systems, System Monitoring, Command-Line Interface, User Accounts, Systems Administration, Windows PowerShell, Technical Support and Services, File Management, Virtualization
Status: Free TrialSkills you'll gain: Splunk, Security Information and Event Management (SIEM), Data Modeling, Role-Based Access Control (RBAC), System Monitoring, Dashboard, Incident Response, Threat Detection, User Accounts, Data Transformation, Cybersecurity, Machine Learning, Systems Administration, Performance Tuning, Data Visualization, Event Monitoring, Continuous Monitoring, Data Manipulation, Data Analysis, Statistical Analysis
In summary, here are 10 of our most popular federal information security management act courses
- IBM z/OS Mainframe Practitioner: IBM
- Cybersecurity in the Cloud: University of Minnesota
- Python Cryptography: Analyze & Break Ciphers: EDUCBA
- Introduction to Secure Networking: Microsoft
- Introducción a Cloud Next Generation Firewall: Google Cloud
- Cyber Threat Hunting: Infosec
- 4G Network Fundamentals: Institut Mines-Télécom
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Architecting with Google Compute Engine: Google Cloud
- ChatGPT Advanced Data Analysis: Vanderbilt University










