Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "federal information security management act"
Status: Free TrialRoyal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Computer Networking, Cybersecurity, Network Protocols, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
Status: Free TrialSkills you'll gain: Network Troubleshooting, Network Monitoring, Network Administration, Network Security, Firewall, Ansible, Network Protocols, Software-Defined Networking, Puppet (Configuration Management Tool), Chef (Configuration Management Tool), Real Time Data, Scripting, JSON, Automation, Application Programming Interface (API)
Status: NewStatus: Free TrialSkills you'll gain: Endpoint Security, Zero Trust Network Access, Security Strategy, Cloud Infrastructure, Multi-Factor Authentication, Security Management, Vulnerability Scanning
Status: NewStatus: Free TrialSkills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, MITRE ATT&CK Framework, Kubernetes, Role-Based Access Control (RBAC), Hardening, Incident Response, Identity and Access Management, Infrastructure Security, Threat Management, Network Security, DevSecOps, Cloud-Native Computing, Threat Detection, Intrusion Detection and Prevention, Public Key Infrastructure, Cloud Security, Firewall, Continuous Monitoring, Application Security
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: Mobile Security, Anomaly Detection, Criminal Investigation and Forensics, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Investigation, Cyber Attacks, File Systems, Intrusion Detection and Prevention, Fraud detection, Mobile Development, Cybersecurity, Applied Machine Learning, Malware Protection, Cyber Security Policies, Apple iOS, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Data Security
Status: NewStatus: Free TrialSkills you'll gain: File Management, Firewall, Linux Administration, Ubuntu, Hardening, OS Process Management, Linux, Authentications, Zero Trust Network Access, Linux Servers, Remote Access Systems, Data Security, User Accounts, Network Security, Linux Commands, Application Security, Security Strategy, Operating System Administration, Continuous Monitoring, IT Security Architecture
Status: NewStatus: FreeSkills you'll gain: Prompt Engineering, ChatGPT, Open Web Application Security Project (OWASP), Responsible AI, Penetration Testing, Threat Modeling, Cyber Operations, Exploitation techniques, Vulnerability Scanning, Generative AI, Scripting
Status: Free TrialSkills you'll gain: Data Centers, Network Security, Virtualization and Virtual Machines, Network Troubleshooting, Network Monitoring, Wide Area Networks, Virtualization, Wireless Networks, Firewall, Hardening, Network Architecture, Network Infrastructure, Virtual Private Networks (VPN), Infrastructure Security, TCP/IP, Cloud Computing, Security Information and Event Management (SIEM), Remote Access Systems, Network Protocols, Internet Of Things
Status: NewSkills you'll gain: Threat Modeling, DevSecOps, Application Security, Security Requirements Analysis, Vulnerability Management, Threat Management, Security Testing, Secure Coding, Vulnerability Assessments, Penetration Testing, Security Awareness, Security Strategy, DevOps, Technology Roadmaps, Risk Management Framework, Software Development Life Cycle
Status: PreviewSkills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Status: NewStatus: PreviewCoursera Instructor Network
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, DevOps, Vulnerability Scanning
Status: NewStatus: Free TrialSkills you'll gain: Network Troubleshooting, Distributed Denial-Of-Service (DDoS) Attacks, Network Administration, Hardening, Network Monitoring, Intrusion Detection and Prevention, Cybersecurity, Network Protocols, Firewall, General Networking, Network Performance Management, Authentications, Identity and Access Management, Encryption, Hardware Troubleshooting, Virtual Local Area Network (VLAN), Key Management, Wireless Networks, Data Integrity
In summary, here are 10 of our most popular federal information security management act courses
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- Network Assurance, Security, and Automation: Packt
- Design security solutions for infrastructure: Whizlabs
- Certified Kubernetes Security Specialist (CKS): Pearson
- Cyber Security: Essentials for Forensics: Macquarie University
- Linux Security Basics and Beyond: Pearson
- ChatGPT for Offensive Security: Infosec
- Advanced Networking, Virtualization, and Security: Packt
- Application Security Program Ignition Guide: Packt
- In the Trenches: Security Operations Center : EC-Council










