Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "federal information security management act"
Status: Free TrialUniversity of California, Davis
Skills you'll gain: Secure Coding, Application Security, C and C++, Verification And Validation, Vulnerability Management, Linux, Security Controls, Vulnerability Assessments, Threat Modeling, Data Validation, Debugging, Cryptography, C (Programming Language), Identity and Access Management, Encryption, File Management, OS Process Management
Status: NewStatus: Free TrialSkills you'll gain: Business Strategy, Organizational Strategy, Business Planning, Strategic Decision-Making, Stakeholder Management, Data Visualization, Competitive Analysis, Market Analysis, Goal Setting, Key Performance Indicators (KPIs), Analysis, Performance Metric
Status: NewCoursera
Skills you'll gain: Brand Awareness, Canva (Software), Brand Management, Logo Design, Branding, Social Media, Social Media Strategy, Brand Strategy, Target Audience, Social Media Marketing, Social Media Campaigns, Brand Loyalty, Brand Marketing, Digital Advertising, Data Visualization, Email Marketing, Digital Marketing, Generative AI, Marketing Analytics, Content Creation
Status: Free TrialRutgers the State University of New Jersey
Skills you'll gain: Strategic Sourcing, Demand Planning, Procurement, Supplier Relationship Management, Supply Chain, Supply Chain Planning, Operational Efficiency, Customer Demand Planning, Supply Chain Management, Presentations, Operations, Logistics, Transportation Management, Forecasting, Inventory and Warehousing, Cost Reduction, Decision Making
Status: FreeCheck Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Systems Architecture, Linux
Status: NewStatus: Free TrialSkills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Identity and Access Management, Security Management, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection
Status: Free TrialSkills you'll gain: Open Shortest Path First (OSPF), Virtual Local Area Network (VLAN), Wide Area Networks, Network Security, Threat Detection, Threat Management, Network Administration, Multiprotocol Label Switching, Network Routing, Virtual Private Networks (VPN), Network Troubleshooting, Dynamic Host Configuration Protocol (DHCP), Network Switches, Network Protocols
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: Cyber Governance, Cyber Security Strategy, Threat Modeling, Cyber Security Policies, Cyber Risk, Governance Risk Management and Compliance, ISO/IEC 27001, Cyber Security Assessment, Cybersecurity, Compliance Management, Governance, NIST 800-53, Risk Mitigation, Risk Management, Audit Planning, Risk Appetite, Policy Analysis, Regulation and Legal Compliance, Stakeholder Engagement, Auditing
Status: NewStatus: Free TrialSkills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, Threat Detection, Threat Modeling, Endpoint Detection and Response
Status: Free TrialIE Business School
Skills you'll gain: Retail Management, Marketing Channel, Merchandising, Conflict Management, Market Opportunities, Retail Sales, Supply Chain, E-Commerce, Market Dynamics, Vendor Relationship Management, Growth Strategies, Cross-Channel Marketing, Supply Chain Planning, Promotional Strategies, Company, Product, and Service Knowledge, Strategic Partnership, Consumer Behaviour, Customer experience strategy (CX)
Status: FreeSkills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
Status: NewSkills you'll gain: User Experience Design, Usability, User Experience, User Interface and User Experience (UI/UX) Design, Threat Modeling, UI/UX Strategy, Interaction Design, Application Security, Authentications, Human Centered Design, Security Strategy, Usability Testing, Authorization (Computing), Security Controls, Multi-Factor Authentication, Security Awareness, Computer Security Awareness Training, Cybersecurity, Safety Standards, Information Privacy
In summary, here are 10 of our most popular federal information security management act courses
- Identifying Security Vulnerabilities in C/C++Programming: University of California, Davis
- Strategic Management & Business Policy: EDUCBA
- Next-Gen Brand Management: Coursera
- Supply Chain Management Strategy: Rutgers the State University of New Jersey
- Check Point Jump Start: Harmony Endpoint Security: Check Point Software Technologies Ltd.
- (SSCP) Systems Security Certified Practitioner: Unit 3: Pearson
- CCNA Advanced – WAN, Security, and Network Services: Packt
- Cyber Security: GRC Part 1 - Governance: Macquarie University
- CISSP Domain 6: Security Assessment and Testing: Infosec
- Channel Management and Retailing : IE Business School










