Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security controls"
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Security, Cloud Infrastructure, Cloud Platforms, Cloud Computing, Cloud Storage, Infrastructure As A Service (IaaS), Emerging Technologies, Hybrid Cloud Computing, IBM Cloud, Serverless Computing, Virtualization, Microservices, Containerization
Palo Alto Networks
Skills you'll gain: Network Security, Cloud Security, Cyber Operations, DevSecOps, Cybersecurity, Key Management, Cloud-Native Computing, Endpoint Detection and Response, Cyber Attacks, General Networking, TCP/IP, Zero Trust Network Access, Cryptography, Cyber Threat Intelligence, Malware Protection, Cloud Platforms, Firewall, Cloud Computing, Endpoint Security, Security Information and Event Management (SIEM)
Skills you'll gain: Continuous Monitoring, Business Continuity, ISO/IEC 27001, Security Management, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
Google Cloud
Skills you'll gain: Cloud Management, Serverless Computing, Google Cloud Platform, Digital Transformation, Data Governance, Cloud Services, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Cloud Infrastructure, Data Strategy, Artificial Intelligence and Machine Learning (AI/ML), Application Programming Interface (API), Real Time Data, Business Transformation, Data Management, Hybrid Cloud Computing, Data Warehousing, Artificial Intelligence, Cloud Computing, Data Security
- Status: Free
Georgia Institute of Technology
Skills you'll gain: User Experience Design, Prototyping, User Centered Design, Usability, Requirements Analysis, User Interface (UI), Interaction Design, Usability Testing, User Research
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Law, Regulation, and Compliance, Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
Google Cloud
Skills you'll gain: Kubernetes, Identity and Access Management, Google Cloud Platform, CI/CD, Containerization, Cloud Management, Cloud Computing, Cloud Infrastructure, Continuous Integration, Application Deployment, Docker (Software), DevOps, Continuous Delivery, Cloud Applications, Cloud Services, Cloud Storage, Cloud Security, Role-Based Access Control (RBAC), Authorization (Computing), Command-Line Interface
University of Pennsylvania
Skills you'll gain: Generative AI, Data Ethics, HR Tech, Data Governance, Big Data, Machine Learning, Data Security, Governance, Business Strategy, Human Resources, Business Leadership, Organizational Strategy, Credit Risk, Risk Management, Tensorflow, Personalized Service, Digital Transformation, Data-Driven Decision-Making, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence
Google Cloud
Skills you'll gain: Dataflow, Google Cloud Platform, Data Pipelines, Serverless Computing, Real Time Data, Dashboard, Cloud Infrastructure, Identity and Access Management, Big Data, Data Visualization Software, Data Integration, Cloud Security, Performance Tuning, Looker (Software), MLOps (Machine Learning Operations), CI/CD, Data Processing, Data Warehousing, Artificial Intelligence and Machine Learning (AI/ML), Cloud Computing
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Information Systems Security, Computer Security Awareness Training, Risk Management, Vulnerability Assessments, Enterprise Security, Cyber Security Assessment
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Regulatory Compliance, General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Compliance Auditing, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Regulatory Requirements, Regulation and Legal Compliance, Communication Planning, Risk Management, Internal Communications, Procedure Development, Data Security, Continuous Monitoring, Business Ethics, Internal Controls, Risk Analysis
Infosec
Skills you'll gain: NIST 800-53, Security Controls, Security Strategy, Cyber Security Policies, Information Assurance, Information Systems Security, Personally Identifiable Information, Configuration Management, Document Management, Identity and Access Management, Change Control, Encryption
Searches related to security controls
In summary, here are 10 of our most popular security controls courses
- Introduction to Cloud Computing:Â IBM
- Palo Alto Networks Cybersecurity:Â Palo Alto Networks
- Security and Risk Management:Â Packt
- Google Cloud Digital Leader Training:Â Google Cloud
- Introduction to User Experience Design :Â Georgia Institute of Technology
- Cybersecurity: Developing a Program for Your Business:Â Kennesaw State University
- Architecting with Google Kubernetes Engine:Â Google Cloud
- AI For Business:Â University of Pennsylvania
- Vertex AI Search for Retail:Â Google Cloud
- Cybersecurity for Business:Â University of Colorado System