Filter by
The language used throughout the course, in both instruction and assessments.
Results for "information security management"
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Infrastructure As A Service (IaaS), Application Deployment, Cloud Applications, Kubernetes, Cloud Computing, CI/CD, Cloud Security, Load Balancing, Service Level Agreement, Infrastructure as Code (IaC), Virtual Machines, Microservices, Service Level, Cloud Computing Architecture, Cloud Storage, Data Storage, Network Architecture
Skills you'll gain: Data Storytelling, Data Presentation, Data Visualization, Interactive Data Visualization, Big Data, Data Visualization Software, Data Analysis, IBM Cognos Analytics, Statistical Analysis, Data Mining, Dashboard, Apache Hadoop, Data Collection, Tree Maps, Excel Formulas, Apache Hive, Microsoft Excel, Data Quality, Data Cleansing, Data Import/Export
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Regulatory Compliance, General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Compliance Auditing, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Regulatory Requirements, Communication Planning, Risk Management, Internal Communications, Procedure Development, Data Security, Continuous Monitoring, Business Ethics, Governance, Internal Controls, Risk Analysis
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Linux Commands, IBM Cognos Analytics, Data Pipelines, Apache Kafka, Bash (Scripting Language), Shell Script, Data Visualization, Dashboard, File Management, Star Schema, Unix Shell, IBM DB2, Business Intelligence, Databases, Stored Procedure, Relational Databases
Skills you'll gain: Information Technology, Computer Hardware, Cloud Computing, Network Troubleshooting, Software Installation, Technical Support and Services, Cybersecurity, Cloud Infrastructure, Hardware Troubleshooting, Data Storage, General Networking, Operating Systems, Computer Security Awareness Training, Serverless Computing, Computer Programming, Databases
- Status: [object Object]
Microsoft
Skills you'll gain: Data Storytelling, Dashboard, Excel Formulas, Extract, Transform, Load, Power BI, Data Analysis Expressions (DAX), Microsoft Excel, Data Modeling, Data-Driven Decision-Making, Star Schema, Data Analysis, Data Presentation, Data Visualization Software, Microsoft Power Platform, Data Integrity, Spreadsheet Software, Data Validation, Data Transformation, Data Cleansing, Data Visualization
Skills you'll gain: Puppet (Configuration Management Tool), CI/CD, Containerization, Infrastructure as Code (IaC), Docker (Software), Continuous Deployment, Continuous Integration, Kubernetes, Cloud Computing, DevOps, Infrastructure As A Service (IaaS), Cloud Services, Configuration Management, Continuous Monitoring, Scalability, Virtual Machines, Public Key Infrastructure, Automation, Regression Testing
Skills you'll gain: Cloud Computing, Cloud Platforms, Computer Security Models, Cyberattacks, Google Cloud Platform, Network Security, Security Engineering, Security Software, Security Strategy, System Security
University of Michigan
Skills you'll gain: Negotiation, Contract Negotiation, Conflict Management, Communication, Contract Management, Influencing, Planning, Decision Making, Ethical Standards And Conduct, Industrial and Organizational Psychology
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Stakeholder Communications, Incident Response, Intrusion Detection and Prevention, Threat Management, Business Risk Management, Network Security, Vulnerability Assessments, Operating Systems, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Computer Security Incident Management, Security Awareness, Bash (Scripting Language), Event Monitoring, Security Controls, Cybersecurity, Debugging
Skills you'll gain: Extract, Transform, Load, Data Architecture, Data Pipelines, Big Data, Data Warehousing, Data Governance, Data Storage Technologies, Apache Hadoop, Relational Databases, Apache Spark, Data Lakes, Databases, SQL, Data Mart, Data Security
In summary, here are 10 of our most popular information security management courses
- International Cyber Conflicts: The State University of New York
- Architecting with Google Compute Engine: Google Cloud
- Data Analysis and Visualization Foundations: IBM
- Regulatory Compliance: University of Pennsylvania
- BI Foundations with SQL, ETL and Data Warehousing: IBM
- Information Technology (IT) Fundamentals for Everyone: IBM
- Microsoft Power BI Data Analyst: Microsoft
- Configuration Management and the Cloud: Google
- Mitigating Security Vulnerabilities on Google Cloud: Google Cloud
- Successful Negotiation: Essential Strategies and Skills: University of Michigan