Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security controls"
Skills you'll gain:
Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Data Lakes, Amazon DynamoDB, Amazon Web Services, Serverless Computing, Cloud Computing, Amazon S3, Scalability, Cloud Infrastructure, Amazon Elastic Compute Cloud, Event-Driven Programming, Cloud Security, Solution Architecture, Data Visualization, Cloud Computing Architecture, Cloud Solutions, Data Architecture, Amazon Redshift, Software Architecture
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Cybersecurity, Configuration Management, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Security Awareness, Cloud Platforms, Encryption
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Vulnerability Scanning, Encryption, Key Management, Virtual Machines
Google Cloud
Skills you'll gain: Cloud Infrastructure, Application Deployment, Infrastructure As A Service (IaaS), Kubernetes, Database Architecture and Administration, MySQL, Identity and Access Management, Cloud Computing, Data Migration, Cloud Management, Cloud API, Oracle Databases, Databases, Cloud Storage, Network Infrastructure, Microsoft SQL Servers, Cloud Security, Cloud Applications, Google Cloud Platform, Database Administration
University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Information Assurance, Security Controls, Incident Response
- Status: New
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Administration, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Transformation, Data Architecture, Jupyter, Generative AI, Relational Databases, Database Design, Automation
Skills you'll gain: Security Controls, Information Assurance, Cybersecurity, Risk Management Framework, Security Awareness, Cyber Governance, Security Management, Cyber Security Policies, Cyber Risk, Data Ethics, Data Integrity
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, General Networking, Routing Protocols, Network Protocols, Network Routing, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks, Data Integrity
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
- Status: Free
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), Automation, Event Monitoring, Continuous Monitoring, System Monitoring, Security Management, Anomaly Detection, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML)
Workday
Skills you'll gain: Workday (Software), Security Controls, Business Process, Workflow Management, Business Reporting, Human Resources Software, System Configuration, Role-Based Access Control (RBAC), Organizational Structure, Data Access, Data Integration, Multi-Tenant Cloud Environments
Searches related to security controls
In summary, here are 10 of our most popular security controls courses
- Assets, Threats, and Vulnerabilities:Â Google
- AWS Cloud Solutions Architect:Â Amazon Web Services
- IBM and ISC2 Cybersecurity Specialist:Â IBM
- Security Best Practices in Google Cloud:Â Google Cloud
- Google Cloud Database Engineer:Â Google Cloud
- Cyber Security Fundamentals:Â University of London
- IBM Relational Database Administrator:Â IBM
- Security Principles:Â ISC2
- The Bits and Bytes of Computer Networking:Â Google
- International Cyber Conflicts:Â The State University of New York