Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security hardening"
Palo Alto Networks
Skills you'll gain: Cyber Operations, Endpoint Detection and Response, Endpoint Security, Security Information and Event Management (SIEM), Zero Trust Network Access, Cybersecurity, Cyber Threat Intelligence, Threat Modeling, Continuous Monitoring, Security Controls, IT Security Architecture, Threat Detection, Incident Response, Malware Protection, Automation, Authentications, Data Lakes
Kennesaw State University
Skills you'll gain: Network Security, Incident Response, Vulnerability Management, Cybersecurity, Contingency Planning, Cyber Governance, Cyber Attacks, Disaster Recovery, Computer Security Incident Management, Cyber Security Policies, Security Management, Firewall, Network Monitoring, Cyber Security Strategy, Crisis Management, Vulnerability Assessments, Cyber Security Assessment, Cyber Risk, Network Protocols, Risk Management
Skills you'll gain: Secure Coding, Application Security, DevSecOps, Security Testing, Software Development Methodologies, Software Configuration Management, Software Development Life Cycle, Software Testing, Threat Modeling, Cyber Security Assessment, Cloud Security, Agile Methodology, Process Driven Development, Verification And Validation, Risk Management Framework
Johns Hopkins University
Skills you'll gain: Security Awareness, Personally Identifiable Information, Encryption, Health Care, Health Information Management and Medical Records, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Medical Records, Information Privacy, Regulatory Compliance, Cloud Computing, Patient Safety
Skills you'll gain: Remote Access Systems, Security Management, Computer Security Incident Management, Data Security, Cybersecurity, Security Controls, Security Strategy, Incident Response, Continuous Monitoring, End User Training and Support, Human Factors (Security), Security Awareness, General Data Protection Regulation (GDPR), System Implementation
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Stakeholder Communications, Incident Response, Intrusion Detection and Prevention, Threat Management, Business Risk Management, Network Security, Vulnerability Assessments, Operating Systems, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Computer Security Incident Management, Security Awareness, Bash (Scripting Language), Event Monitoring, Security Controls, Cybersecurity, Debugging
Skills you'll gain: Cybersecurity, Technical Support and Services, Information Technology, Network Security, Cyber Security Strategy, Computer Security Awareness Training, Application Security, Security Management
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cybersecurity, Security Management, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Cyber Attacks, Malware Protection, Email Security, Vulnerability Management, Artificial Intelligence
Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, NIST 800-53, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR), Business Ethics
Skills you'll gain: Network Security, Cloud Computing, Network Infrastructure, Microsoft Azure, Firewall, Computer Networking, Virtualization and Virtual Machines, Networking Hardware, Cybersecurity, Network Protocols, Artificial Intelligence and Machine Learning (AI/ML)
Cisco Learning and Certifications
Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Information Systems Security, Cybersecurity, Network Security, Security Information and Event Management (SIEM), Network Monitoring, Information Assurance, Network Analysis, Intrusion Detection and Prevention, Event Monitoring, Data Capture, Data Integrity, Network Troubleshooting, Incident Response
University of Michigan
Skills you'll gain: PHP (Scripting Language), Hypertext Markup Language (HTML), MySQL, Web Applications, Web Development, Cascading Style Sheets (CSS), Development Environment, Back-End Web Development, Database Development, Web Servers, Application Security, Software Installation, Data Validation
In summary, here are 10 of our most popular security hardening courses
- Palo Alto Networks Security Operations Fundamentals:Â Palo Alto Networks
- Managing Cybersecurity:Â Kennesaw State University
- Secure Software Development:Â Packt
- Healthcare Data Security, Privacy, and Compliance:Â Johns Hopkins University
- Advanced Techniques for Implementing Security Services:Â LearnQuest
- Ciberseguridad de Google:Â Google
- Introduction to Cybersecurity Careers:Â IBM
- Cybersecurity Case Studies and Capstone Project:Â IBM
- Cybersecurity Compliance Framework, Standards & Regulations:Â IBM
- Introduction to Networking and Cloud Computing:Â Microsoft