Filter by
The language used throughout the course, in both instruction and assessments.
Results for "information systems security"
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Presentation, Data Security, Data Migration, Database Design, Data Visualization, Data Governance, MySQL, Interactive Data Visualization, Extract, Transform, Load, Cloud Storage, Data Visualization Software, Relational Databases, Stored Procedure, Data Architecture, Excel Formulas, Microsoft Excel
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Databases, Software Architecture, Secure Coding, Software Design Patterns, Systems Design, Software Engineering, Software Development Tools, Software Development Life Cycle, Technical Design, Security Engineering
University of Colorado System
Skills you'll gain: Planning, Security Software, System Security, Computer Security Incident Management, Leadership and Management, Data Management, Operating Systems, Risk Management, Strategy and Operations
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, Crisis Management, Incident Response, OpenAI, Data Ethics, Computer Security Incident Management, Artificial Intelligence, Personalized Service, Business Ethics, Information Privacy, Personally Identifiable Information, Cross-Functional Collaboration, Threat Detection, Threat Management, Expense Management, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Creative Thinking, Creativity
University of Colorado System
Skills you'll gain: Computer Security Incident Management, Security Engineering, Software Security, System Security, Cyberattacks, Leadership and Management, Network Security, Risk Management, Security Software, Security Strategy
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Containerization, Encryption
University of Colorado System
Skills you'll gain: Windows Servers, Authorization (Computing), Microsoft Windows, Authentications, User Accounts, Group Policy, Security Controls, Active Directory, Identity and Access Management, Software Installation, Servers, Encryption, Network Planning And Design, Network Performance Management
Kennesaw State University
Skills you'll gain: Mobile Security, Security Engineering, Strategy, Mobile Development, Software Security, System Security, Business Transformation, Human Computer Interaction, Leadership and Management, Security Strategy, Internet Of Things
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Application Security, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls
Kennesaw State University
Skills you'll gain: Leadership and Management, Strategy and Operations
Skills you'll gain: Threat Modeling, Vulnerability Assessments, Risk Analysis, Personally Identifiable Information, Risk Management, Risk Control, IT Management, Risk Appetite, Compliance Reporting, Information Technology Architecture, Vulnerability Management, Business Continuity, General Data Protection Regulation (GDPR), Business Risk Management, Operational Risk, Information Privacy, Risk Management Framework, Risk Mitigation, Cyber Security Assessment, Information Technology
Searches related to information systems security
In summary, here are 10 of our most popular information systems security courses
- IBM Data Management: IBM
- Secure Software Design: University of Colorado System
- Planning, Auditing and Maintaining Enterprise Systems: University of Colorado System
- Generative AI Cybersecurity & Privacy for Leaders: Vanderbilt University
- Introduction to Cybersecurity for Business: University of Colorado System
- Systems and Application Security: ISC2
- Windows Server Management and Security: University of Colorado System
- Cybersecurity and Mobility: Kennesaw State University
- Advanced System Security Design: University of Colorado System
- Fundamentals of Computer Network Security: University of Colorado System