Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "federal information security management act"
Status: NewStatus: PreviewCoursera Instructor Network
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, DevOps, Vulnerability Scanning

Google Cloud
Skills you'll gain: Vulnerability Scanning, Google App Engine, Vulnerability Assessments, Application Security, Cloud Security, Google Cloud Platform
Status: PreviewUniversity of Michigan
Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, Computer Networking, Encryption, Network Infrastructure, Innovation, Hypertext Markup Language (HTML)
Status: Free TrialUniversity of Colorado Boulder
Skills you'll gain: Internet Of Things, Real-Time Operating Systems, General Networking, Wireless Networks, Information Systems Security, Application Security, Petroleum Industry, Automation, Network Protocols, Emerging Technologies, Cloud Platforms, Embedded Systems, Market Analysis, Interviewing Skills, Software-Defined Networking, Workforce Development, Platform As A Service (PaaS)
Status: NewStatus: Free TrialSkills you'll gain: Incident Response, Computer Security Incident Management, Vulnerability Management, Security Information and Event Management (SIEM), Cyber Operations, Event Monitoring, Cyber Threat Hunting, Intrusion Detection and Prevention, Cyber Threat Intelligence, Enterprise Security, Threat Detection, Data Loss Prevention, Security Controls, Network Security, Network Monitoring

Skills you'll gain: Authentications, Incident Response, MITRE ATT&CK Framework, Security Controls, Cryptography, Malware Protection, Cryptographic Protocols, Threat Modeling, Endpoint Security, Key Management, Authorization (Computing), Public Key Infrastructure, Vulnerability Assessments, Risk Management, Network Security, Application Security, Asset Management, Cloud Security, OSI Models, Continuous Monitoring
Status: Free TrialSkills you'll gain: Penetration Testing, Security Testing, Data Management, Records Management, Cloud Computing Architecture, Authentications, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, System Testing, Cyber Threat Intelligence, Authorization (Computing), General Data Protection Regulation (GDPR), Cloud Computing, Data Governance, Active Directory, Data Ethics, Responsible AI, LLM Application
Status: NewStatus: PreviewStarweaver
Skills you'll gain: Threat Modeling, Risk Analysis, Cyber Risk, Governance Risk Management and Compliance, Cyber Security Strategy, Risk Management Framework, Risk Management, Cybersecurity, Risk Mitigation, Governance, Vulnerability Assessments, Business Risk Management, Management Reporting, Analysis, Technical Communication, Dashboard, Data Visualization
Status: NewStatus: Free TrialSkills you'll gain: Google Cloud Platform, Cost Management, Cloud Management, System Monitoring, Application Performance Management, Cloud Security, Identity and Access Management, Key Management, Infrastructure as Code (IaC), Continuous Monitoring, Encryption, Serverless Computing, Event-Driven Programming, Real Time Data
Status: Free TrialLearnQuest
Skills you'll gain: Blockchain, Key Management, Threat Modeling, Application Security, Computer Security, Public Key Infrastructure, Security Controls, Cryptography, Cybersecurity, Network Security, Information Systems Security, Data Security, Security Engineering, Vulnerability Assessments, Secure Coding, Cryptographic Protocols, Infrastructure Security, Encryption, Security Testing, Solution Design
Status: Free TrialSkills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Google Cloud Platform, Data Security, Vulnerability Management, Threat Detection, IT Automation, Identity and Access Management, System Monitoring
Status: NewStatus: Free TrialUniversity of Huddersfield
Skills you'll gain: Stakeholder Management, Organizational Strategy, Innovation, Strategic Leadership, Stakeholder Analysis, Organizational Change, Business Strategy, Strategic Decision-Making, Change Management, Business Ethics, Leadership, Business Modeling, Case Studies
In summary, here are 10 of our most popular federal information security management act courses
- Security Essentials for Modern Developers: Coursera Instructor Network
- Cloud Security Scanner: Qwik Start: Google Cloud
- Internet History, Technology, and Security: University of Michigan
- Industrial IoT Markets and Security: University of Colorado Boulder
- Into the Trenches: Security Operations Center : EC-Council
- ISC2 Systems Security Certified Practitioner (SSCP): ISC2
- Microsoft Azure Security Tools Specialization: Microsoft
- Cyber Risk Management Strategies: Starweaver
- GCP: Monitoring, Security, and Costs: Whizlabs
- Security for Blockchain and DApps: LearnQuest










