Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security and compliance"
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
- Status: Free
Coursera Instructor Network
Skills you'll gain: Occupational Safety and Health Administration (OSHA), Occupational Safety And Health, Safety Training, Health And Safety Standards, Safety Culture, Compliance Management, Regulatory Compliance, Labor Law, Workers Compensation
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Threat Modeling, Personally Identifiable Information, Malware Protection, Email Security
University of Michigan
Skills you'll gain: Programming Principles, Computer Programming, Python Programming, Computational Thinking, Software Installation, Development Environment
University of Michigan
Skills you'll gain: Data Structures, Python Programming, Data Manipulation, Development Environment, File Management, Data Analysis, Computer Programming, Software Installation
Skills you'll gain: Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix Shell, Query Languages, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Skills you'll gain: Dashboard, Data Visualization Software, Plotly, Data Wrangling, Data Visualization, Interactive Data Visualization, Exploratory Data Analysis, Data Cleansing, Jupyter, Matplotlib, Data Analysis, Pandas (Python Package), Data Manipulation, Seaborn, Data Import/Export, Predictive Modeling, Web Scraping, Automation, Data Science, Python Programming
Skills you'll gain: Analytics, Business Analytics, Data Analysis, Microsoft PowerPoint, Data Presentation, Presentations, Excel Formulas, Data-Driven Decision-Making, Dashboard, Data Storytelling, Business Intelligence, Microsoft Excel, Customer Analysis, Data Visualization, Data Visualization Software, Big Data, Target Market, Data Cleansing, Public Speaking, Spreadsheet Software
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Visualization, Statistical Programming, Ggplot2, Dimensionality Reduction, Data Visualization Software, Data Integration, Knitr, Data Analysis, Data Import/Export, General Science and Research, Data Sharing, Statistical Reporting
- Status: AI skills
Google Cloud
Skills you'll gain: Cloud Security, Identity and Access Management, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Management, Cyber Threat Hunting, Risk Management Framework, Cyber Operations, Vulnerability Management, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Generative AI, DevSecOps, Cloud Computing, Data Security, Google Cloud Platform, Cybersecurity
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
Searches related to security and compliance
In summary, here are 10 of our most popular security and compliance courses
- Introduction to Cybersecurity Tools & Cyberattacks: IBM
- Network Security: ISC2
- Introduction to OSHA: Safety Standards and Compliance: Coursera Instructor Network
- Introduction to Cybersecurity Fundamentals: Coursera Instructor Network
- Programming for Everybody (Getting Started with Python): University of Michigan
- Python Data Structures: University of Michigan
- Tools of the Trade: Linux and SQL: Google
- Applied Data Science: IBM
- Data Analysis and Presentation Skills: the PwC Approach: PwC
- Data Science: Foundations using R: Johns Hopkins University