Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "it security best practices"
- Status: New AI skills
Skills you'll gain: Quality Management, Scope Management, Project Scoping, Project Closure, Project Management, Project Management Life Cycle, Project Planning, Continuous Improvement Process, Agile Project Management, Process Improvement, Quality Monitoring, Backlogs, Team Management, Project Documentation, Agile Methodology, Communication Planning, Project Risk Management, Change Management, Milestones (Project Management), Organizational Structure
Skills you'll gain: Desktop Support, Computer Hardware, Technical Support, Software Installation, Technical Documentation, Hardware Troubleshooting, Computer Networking, Information Technology, Technical Communication, Software Systems, Linux, Microsoft Windows
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Incident Management, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Security Awareness, Authorization (Computing)
Coursera Project Network
Skills you'll gain: Interviewing Skills, Recruitment, Talent Recruitment, Job Analysis
Erasmus University Rotterdam
Skills you'll gain: Microsoft Excel, Excel Formulas, Data Modeling, Business Modeling, Spreadsheet Software, Technical Documentation, Product Testing, Data Validation, Asset Protection, Maintainability, Data Management
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
- Status: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
Skills you'll gain: Agile Software Development, Cloud Computing Architecture, Cloud Services, Agile Methodology, DevOps, Kanban Principles, Cloud Security, Cloud Infrastructure, Cloud Platforms, Cloud Computing, Agile Project Management, Cloud-Native Computing, User Story, Cloud Storage, Sprint Retrospectives, Sprint Planning, Workflow Management, CI/CD, Test Driven Development (TDD), Scrum (Software Development)
Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Infrastructure as Code (IaC), Command-Line Interface, Amazon CloudWatch, AWS CloudFormation, Root Cause Analysis, Amazon DynamoDB, Network Troubleshooting, Amazon Web Services, Customer Relationship Management, Software Architecture, Linux Commands, Cloud Computing, Linux, Amazon S3, Scalability, Scripting, Amazon Elastic Compute Cloud, Bash (Scripting Language), Web Applications
Skills you'll gain: Istio, Open Web Application Security Project (OWASP), Software Development Life Cycle, Linux Commands, Kubernetes, Unit Testing, Application Deployment, NoSQL, Bash (Scripting Language), MongoDB, Shell Script, Django (Web Framework), Cloud-Native Computing, Object-Relational Mapping, OpenShift, Git (Version Control System), Cloud Applications, Containerization, Jupyter, Grafana
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Cryptographic Protocols, Data Security, Email Security, Computer Security Awareness Training, Advanced Encryption Standard (AES), Security Awareness, Key Management, Secure Coding, Technical Support and Services, Information Technology, Cyber Security Strategy
Skills you'll gain: Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Network Monitoring, Cloud Computing Architecture, Containerization, Network Architecture, Role-Based Access Control (RBAC), Network Security, OAuth, Cloud Storage, Network Routing, Cloud Security, Virtual Private Networks (VPN)
In summary, here are 10 of our most popular it security best practices courses
- Google Project Management::Â Google
- Technical Support Fundamentals:Â Google
- ISC2 Systems Security Certified Practitioner (SSCP):Â ISC2
- Preparation for Job Interviews:Â Coursera Project Network
- Excel Modeling for Professionals: Best Practices & Pitfalls:Â Erasmus University Rotterdam
- IBM Cybersecurity Analyst:Â IBM
- Microsoft Cybersecurity Analyst:Â Microsoft
- DevOps, Cloud, and Agile Foundations:Â IBM
- AWS Cloud Support Associate:Â Amazon Web Services
- IBM Back-End Development:Â IBM