Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security and compliance governance"
Skills you'll gain: Package and Software Management, Desktop Support, Linux, Microsoft Windows, File Systems, Remote Access Systems, Operating Systems, Linux Administration, OS Process Management, System Support, Systems Administration, Software Installation, User Accounts, System Configuration, Linux Commands, Command-Line Interface, System Monitoring, User Provisioning, Authorization (Computing), Identity and Access Management
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Google Sheets, Business Analytics, Spreadsheet Software, Analytical Skills, Data Sharing, Data Cleansing, Data Processing, Data Strategy, Data Visualization Software, SQL
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Information and Event Management (SIEM), Security Awareness
Skills you'll gain: Open Web Application Security Project (OWASP), Istio, Software Development Life Cycle, Linux Commands, Unit Testing, Application Deployment, Kubernetes, NoSQL, Bash (Scripting Language), MongoDB, Shell Script, Django (Web Framework), Object-Relational Mapping, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Jupyter, Grafana
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
Skills you'll gain: Security Management, Incident Management, Threat Management, Cyber Governance, Risk Management Framework, Security Strategy, Cybersecurity, Cyber Security Policies, Information Assurance, Cyber Security Assessment, Security Controls, Vulnerability Assessments, Cyber Risk, Security Requirements Analysis, Security Awareness, Disaster Recovery
Skills you'll gain: Bash (Scripting Language), Linux Commands, Command-Line Interface, Operating Systems, SQL, Linux, Cybersecurity, Linux Administration, Databases, Computer Hardware, Relational Databases, File Systems, User Accounts
DeepLearning.AI
Skills you'll gain: Supervised Learning, Applied Machine Learning, Jupyter, Scikit Learn (Machine Learning Library), Machine Learning, NumPy, Predictive Modeling, Feature Engineering, Artificial Intelligence, Classification And Regression Tree (CART), Python Programming, Regression Analysis, Unsupervised Learning, Statistical Modeling, Data-Driven Decision-Making, Algorithms
- Status: [object Object]
Skills you'll gain: NoSQL, Data Warehousing, SQL, Apache Hadoop, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, IBM Cognos Analytics, MySQL, Apache Spark, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Jupyter, Generative AI, Professional Networking
- Status: Free
Yale University
Skills you'll gain: Growth Mindedness, Optimism, Positive Behavior Support, Goal Setting, Resilience, Self-Motivation, Self-Awareness, Emotional Intelligence, Mental Health, Psychology, Social Skills, Decision Making, Time Management
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Threat Intelligence, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Governance, Continuous Monitoring, Security Management, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Infrastructure Architecture
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Cryptographic Protocols, Data Security, Email Security, Computer Security Awareness Training, Advanced Encryption Standard (AES), Security Awareness, Key Management, Secure Coding, Technical Support and Services, Information Technology, Cyber Security Strategy
Searches related to security and compliance governance
In summary, here are 10 of our most popular security and compliance governance courses
- Operating Systems and You: Becoming a Power User: Google
- Foundations: Data, Data, Everywhere: Google
- Security Analyst Fundamentals: IBM
- IBM Back-End Development: IBM
- Sound the Alarm: Detection and Response: Google
- Certified Information Security Manager (CISM): Packt
- Tools of the Trade: Linux and SQL: Google
- Supervised Machine Learning: Regression and Classification : DeepLearning.AI
- IBM Data Engineering: IBM
- The Science of Well-Being: Yale University