Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "information technology operations"
- Status: Preview
The University of Chicago
Skills you'll gain: Neurology, Psychology, Kinesiology, Anatomy, Behavioral Health, Human Learning, Human Development, Blood Pressure, Mental and Behavioral Health, Mental Health Diseases and Disorders, Respiration, Vital Signs, Biology, Speech Language Pathology
- Status: Preview
University of Virginia
Skills you'll gain: Marketing Analytics, Marketing Effectiveness, Marketing, Marketing Strategies, Regression Analysis, Data-Driven Decision-Making, Strategic Marketing, Brand Management, Resource Allocation, Customer Insights, Predictive Analytics, Advertising Campaigns, Statistical Analysis, A/B Testing, Consumer Behaviour, Return On Investment
- Status: Free Trial
University of California, Davis
Skills you'll gain: Data Storytelling, Data Presentation, Dashboard, Data Visualization, Advanced Analytics, Tableau Software, Interactive Data Visualization, Data Visualization Software, Data Literacy, Proposal Development, Exploratory Data Analysis, Data Ethics, Visualization (Computer Graphics), Data Mapping, Pivot Tables And Charts, Tree Maps, Requirements Analysis, Analytics, Data Analysis Expressions (DAX), Storyboarding
- Status: Free Trial
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP)
- Status: Free Trial
Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management
- Status: Free Trial
University of Illinois Urbana-Champaign
Skills you'll gain: Mergers & Acquisitions, Working Capital, Revenue Recognition, Financial Statements, Credit Risk, Accrual Accounting, Financial Analysis, Investments, Corporate Finance, Business Valuation, Cash Flows, Financial Accounting, Financial Statement Analysis, Bookkeeping, Financial Management, Income Statement, Business Ethics, Finance, Portfolio Management, Risk Management
- Status: Free Trial
Howard University
Skills you'll gain: Design Thinking, Business Software, Information Systems, Cloud Computing, Business Systems, Cloud Solutions, Business Technologies, Cloud Computing Architecture, Cloud Security, Virtualization, Digital Transformation, Cloud Services, Management Information Systems, Product Design, Business Solutions, Information Technology, Customer Insights, User Centered Design, Cybersecurity, Data Management
- Status: Free Trial
Skills you'll gain: Data Storytelling, Presentations, Rmarkdown, Data Presentation, Data Cleansing, Data Visualization, Data Literacy, Ggplot2, Data Validation, Spreadsheet Software, Data Visualization Software, Data Ethics, Data Analysis, Data-Driven Decision-Making, Tableau Software, Data Processing, Dashboard, Business Analysis, Stakeholder Communications, Databases
- Status: Free Trial
University of Michigan
Skills you'll gain: Payment Systems, Payment Processing, FinTech, Blockchain, Mobile Banking, Fundraising and Crowdsourcing, Credit/Debit Card Processing, Banking Services, Emerging Technologies, Investment Management, Wealth Management, Payment Processing and Collection, Asset Management, Investments, Point of Sale, Fundraising, Capital Markets, Consumer Lending, Credit Risk, Market Dynamics
- Status: Free Trial
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
- Status: NewStatus: Free Trial
EC-Council
Skills you'll gain: Network Security, Incident Response, Computer Security Incident Management, Cryptography, Penetration Testing, Vulnerability Management, Cybersecurity, Application Security, Cyber Security Policies, Security Information and Event Management (SIEM), Threat Detection, Network Monitoring, Cloud Security, Vulnerability Assessments, Malware Protection, Mobile Security, Identity and Access Management, Internet Of Things, Risk Analysis, Web Applications
- Status: Free Trial
University of Alberta
Skills you'll gain: Requirements Analysis, Agile Software Development, Agile Methodology, Kanban Principles, Project Planning, Requirements Elicitation, Sprint Retrospectives, Requirements Management, Functional Requirement, Business Requirements, Sprint Planning, Software Development Methodologies, Software Development Life Cycle, Scrum (Software Development), Product Requirements, Software Technical Review, Backlogs, Risk Management Framework, Product Management, Project Management
In summary, here are 10 of our most popular information technology operations courses
- Understanding the Brain: The Neurobiology of Everyday Life:Â The University of Chicago
- Marketing Analytics:Â University of Virginia
- Data Visualization with Tableau:Â University of California, Davis
- Security Analyst Fundamentals:Â IBM
- Security Operations:Â ISC2
- Financial Management:Â University of Illinois Urbana-Champaign
- Introduction to Information Systems for Business:Â Howard University
- Análisis de Datos de Google: Google
- Financial Technology (Fintech) Innovations:Â University of Michigan
- Assets, Threats, and Vulnerabilities:Â Google