Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "implementing security controls"
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
Skills you'll gain: Data Pipelines, Dataflow, Google Cloud Platform, Real Time Data, Data Lakes, Data Storage, MLOps (Machine Learning Operations), Data Analysis, Dashboard, Data Warehousing, Data Processing, Extract, Transform, Load, Data Infrastructure, Cloud Infrastructure, Cloud Storage, Big Data, Tensorflow, Unstructured Data, Data Management, Data Integration
ISC2
Skills you'll gain: Authentications, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Data Security, Security Controls, User Provisioning, Information Systems Security, Multi-Factor Authentication, Network Architecture
- Status: Free
Skills you'll gain: Cloud Computing Architecture, Cloud Security, Cloud Infrastructure, Cloud Computing, Cloud Applications, IT Security Architecture, Cloud Services, Infrastructure Security, Application Security, Data Security, Cybersecurity, Security Controls, Risk Management Framework, Encryption
University of California San Diego
Skills you'll gain: Data Structures, Graph Theory, Algorithms, Debugging, Network Model, Bioinformatics, Advanced Mathematics, Operations Research, Data Storage, Development Testing, Software Testing, Theoretical Computer Science, Computational Thinking, Network Analysis, Programming Principles, Network Routing, Epidemiology, Computer Programming, C++ (Programming Language), Infectious Diseases
Skills you'll gain: Data Ethics, Data Analysis, Data Security, Google Sheets, Databases, Data Storage, Data Quality, Data Integrity, Data Management, Data Collection, Data Manipulation, Relational Databases, SQL, Metadata Management, Unstructured Data
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Record Keeping, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
Skills you'll gain: Quality Management, Project Closure, Project Management, Continuous Improvement Process, Project Controls, Quality Monitoring, Team Management, Project Risk Management, Data-Driven Decision-Making, Project Documentation, Stakeholder Communications, Technical Communication, Meeting Facilitation, Communication
- Status: New
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, Database Administration, MySQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Transformation, IBM DB2, Relational Databases, Jupyter, Generative AI
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
- Status: Free
Infosec
Skills you'll gain: Blockchain, Network Security, Application Security, Security Engineering, Computer Security, Infrastructure Security, Information Systems Security, Cybersecurity, Data Security, Cryptography, Cryptographic Protocols, Secure Coding, Encryption, Vulnerability Assessments, Scalability, Distributed Computing, Data Integrity, Other Programming Languages, Algorithms
University of California, Irvine
Skills you'll gain: Time Management, Business Writing, Goal Setting, Negotiation, Cash Management, Business Planning, Planning, Project Controls, Feasibility Studies, Delegation Skills, Peer Review, Team Leadership, Business Correspondence, Creative Problem-Solving, Problem Solving, Professional Networking, Financial Analysis, Communication Strategies, Communication, Emotional Intelligence
In summary, here are 10 of our most popular implementing security controls courses
- Security Concepts and Practices:Â ISC2
- Preparing for Google Cloud Certification: Cloud Data Engineer:Â Google Cloud
- Access Control:Â ISC2
- Certified Cloud Security Professional (CCSP):Â Infosec
- Data Structures and Algorithms:Â University of California San Diego
- Prepare Data for Exploration:Â Google
- Sound the Alarm: Detection and Response:Â Google
- Project Execution: Running the Project:Â Google
- IBM Relational Database Administrator:Â IBM
- Assets, Threats, and Vulnerabilities:Â Google