Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity controls"
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Threat Detection, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Enterprise Risk Management (ERM), Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
University of California, Irvine
Skills you'll gain: Cost Estimation, Stakeholder Management, Project Risk Management, Project Controls, Project Schedules, Work Breakdown Structure, Project Performance, Estimation, Conflict Management, Quality Management, Change Control, Project Management, Timelines, Milestones (Project Management), Project Planning, Peer Review, Budgeting, Scheduling, Project Management Life Cycle, Risk Analysis
Skills you'll gain: Risk Management Framework, Cyber Risk, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cybersecurity, Continuous Monitoring, Security Management, Cyber Governance, Cyber Security Strategy, Risk Management, Security Controls, Infrastructure Security, Cyber Security Assessment, Vulnerability Assessments, Enterprise Risk Management (ERM), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
DeepLearning.AI
Skills you'll gain: Generative AI, PyTorch (Machine Learning Library), Image Analysis, Deep Learning, Artificial Neural Networks, Data Ethics, Applied Machine Learning, Computer Vision, Machine Learning, Unsupervised Learning, Artificial Intelligence, Information Privacy, Performance Testing, Machine Learning Algorithms
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Prompt Engineering, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Services, Application Deployment, Virtual Machines, Security Controls, Cloud Computing, Application Development, Data Storage Technologies, Threat Management, Virtual Private Networks (VPN)
Kennesaw State University
Skills you'll gain: Six Sigma Methodology, Root Cause Analysis, Lean Methodologies, Data Collection, Process Improvement, Quality Improvement, Process Optimization, Lean Six Sigma, Correlation Analysis, Statistical Hypothesis Testing, Kaizen Methodology, Process Analysis, Probability Distribution, Regression Analysis, Process Capability, Business Process, Statistical Process Controls, Quality Management, Team Management, Continuous Improvement Process
University at Buffalo
Skills you'll gain: Model Based Systems Engineering, Peer Review, Systems Engineering, Product Lifecycle Management, Intrusion Detection and Prevention, Security Controls, Performance Measurement, Control Systems, Continuous Monitoring, Anomaly Detection, Machine Controls, Incident Response, Digital Transformation, Vulnerability Assessments, Software Development Life Cycle, Process Analysis, Data Sharing, Manufacturing Processes, Manufacturing Operations, Product Design
Skills you'll gain: Cybersecurity, Cloud Computing, Network Monitoring, Command-Line Interface, General Networking, Linux, Windows PowerShell, Virtual Machines
Board Infinity
Skills you'll gain: Vulnerability Assessments, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Cyber Security Assessment, Command-Line Interface, Linux Commands, Cybersecurity, Linux, Network Security, Intrusion Detection and Prevention, Software Installation, Network Analysis
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Operations, Cyber Governance, Continuous Monitoring, NIST 800-53, Security Management, Incident Response, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Legal Risk
Skills you'll gain: Computer Systems, Business Software, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Computer Hardware, Information Systems Security, Data Storage, Patch Management, Microsoft 365, Artificial Intelligence
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
In summary, here are 10 of our most popular cybersecurity controls courses
- Cybersecurity: Developing a Program for Your Business:Â Kennesaw State University
- Project Management Principles and Practices:Â University of California, Irvine
- Cybersecurity Risk Management Framework:Â Infosec
- Generative Adversarial Networks (GANs):Â DeepLearning.AI
- Security in Google Cloud:Â Google Cloud
- Six Sigma Yellow Belt:Â Kennesaw State University
- Digital Manufacturing & Design Technology:Â University at Buffalo
- Introduction to Cybersecurity Foundations:Â Infosec
- Kali Linux:Â Board Infinity
- Homeland Security and Cybersecurity:Â University of Colorado System