Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "federal information security management act"
Status: Free TrialSkills you'll gain: Web Services, Email Automation, Scripting, Automation, Python Programming, Restful API, Application Programming Interface (API), JSON, System Monitoring, Image Analysis
Status: Free TrialSkills you'll gain: Amazon Web Services, Distributed Denial-Of-Service (DDoS) Attacks, Infrastructure Security, Cloud Security, Network Security, AWS Identity and Access Management (IAM), Application Security, Firewall, Amazon Elastic Compute Cloud, Endpoint Security, Vulnerability Management, Amazon CloudWatch
Status: Free TrialSkills you'll gain: Extract, Transform, Load, Apache Airflow, Data Pipelines, Apache Kafka, Data Warehousing, Data Transformation, Data Migration, Web Scraping, Data Integration, Shell Script, Data Processing, Data Mart, Unix Shell, Big Data, Performance Tuning, Scalability, Command-Line Interface

Skills you'll gain: Control Objectives for Information and Related Technology (COBIT), IT Management, Information Technology Architecture, Performance Management, Governance, Enterprise Architecture, Program Implementation, Process Management, Information Technology, Business Process, Training and Development, Risk Management
Status: NewStatus: Free TrialSkills you'll gain: TCP/IP, Network Protocols, Network Troubleshooting, Network Infrastructure, General Networking, Network Planning And Design, OSI Models, Computer Networking, Network Analysis
Status: Free TrialSkills you'll gain: Cyber Operations, Cybersecurity, Authentications, Python Programming, Data Access, Network Security, System Monitoring, Network Protocols
Status: Free TrialJohns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
Status: Free TrialGoogle
Skills you'll gain: Operating System Administration, Package and Software Management, IT Infrastructure, Network Troubleshooting, Computer Networking, Infrastructure Security, Encryption, Desktop Support, Network Security, Routing Protocols, TCP/IP, Cybersecurity, Lightweight Directory Access Protocols, Technical Support, Active Directory, Network Protocols, Computer Hardware, Cloud Computing, Customer Service, Debugging
Status: Free TrialMicrosoft
Skills you'll gain: Power BI, Dashboard, Microsoft Power Platform, Data Visualization, Data Integration, Business Intelligence, Performance Analysis, Data Security, Microsoft Teams, Data Analysis Software, Data Modeling, No-Code Development, Customer Engagement
Status: Free TrialIllinois Tech
Skills you'll gain: Operating System Administration, Microsoft Windows, Operating Systems, System Configuration, Firewall, Linux Administration, Linux, Linux Servers, System Monitoring, Authorization (Computing), Windows Servers, Data Security
Status: Free TrialSkills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Microsoft Azure, Active Directory, Authorization (Computing), Identity and Access Management, User Provisioning, Cloud Management, Cloud Security, User Accounts, Cloud Storage, Data Security, Data Storage, Key Management, Data Storage Technologies, Encryption
Status: Free TrialSkills you'll gain: Routing Protocols, TCP/IP, Network Troubleshooting, OSI Models, Network Switches, Data Centers, Virtual Local Area Network (VLAN), Network Protocols, Network Security, Network Routing, Network Administration, Virtualization and Virtual Machines, Computer Networking, Network Monitoring, Wide Area Networks, Virtualization, Wireless Networks, Network Model, Networking Hardware, Local Area Networks
In summary, here are 10 of our most popular federal information security management act courses
- Automating Real-World Tasks with Python: Google
- Securing Hosts, Network, and Edge in AWS: Packt
- ETL and Data Pipelines with Shell, Airflow and Kafka: IBM
- COBIT 2019 Foundation : Packt
- IP Addressing and Core Protocols: Packt
- Establishing Command-and-Control and Finding Credentials: Infosec
- Advanced Cybersecurity Techniques: Johns Hopkins University
- IT-поддержка Google: Google
- Power BI & Power Virtual Agents: Microsoft
- Hardware and Operating System Foundations III: Illinois Tech










