Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security analysis"
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Law, Regulation, and Compliance, Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
Multiple educators
Skills you'll gain: Incident Response, Network Security, Computer Security Incident Management, Cloud Computing Architecture, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Cybersecurity, Configuration Management, Computing Platforms, Hardware Troubleshooting, Computer Hardware, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Peripheral Devices, Security Awareness
Skills you'll gain: Cloud Infrastructure, Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Infrastructure As A Service (IaaS), Network Monitoring, Cloud Applications, Cloud Computing Architecture, Network Architecture, Role-Based Access Control (RBAC), Network Security, Cloud Computing, Network Routing, Cloud Security, Virtual Private Networks (VPN)
Palo Alto Networks
Skills you'll gain: Cyber Operations, Endpoint Detection and Response, Endpoint Security, Security Information and Event Management (SIEM), Zero Trust Network Access, Cybersecurity, Cyber Threat Intelligence, Threat Modeling, Continuous Monitoring, Security Controls, IT Security Architecture, Threat Detection, Incident Response, Malware Protection, Automation, Authentications, Data Lakes
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Security, Data Migration, Database Design, Data Visualization, Data Governance, MySQL, Extract, Transform, Load, Cloud Storage, Data Visualization Software, IBM DB2, Data Management, Relational Databases, Stored Procedure, Data Architecture, Excel Formulas, Microsoft Excel
Skills you'll gain: Data Storytelling, Interactive Data Visualization, Data Visualization Software, Data Visualization, Shiny (R Package), Data Wrangling, Exploratory Data Analysis, Statistical Visualization, Relational Databases, Big Data, Ggplot2, Database Design, Data Analysis, Data Presentation, Data Mining, Dashboard, Excel Formulas, Data Manipulation, Web Scraping, Microsoft Excel
Rice University
Skills you'll gain: Statistical Hypothesis Testing, Microsoft Excel, Pivot Tables And Charts, Regression Analysis, Descriptive Statistics, Probability & Statistics, Graphing, Probability Distribution, Business Analytics, Statistical Analysis, Statistical Modeling, Excel Formulas, Data Analysis, Data Presentation, Statistics, Sample Size Determination, Box Plots, Analytical Skills, Estimation, Statistical Inference
University of Colorado System
Skills you'll gain: Security Requirements Analysis, Requirements Analysis, Risk Management Framework, User Requirements Documents, Scalability, Verification And Validation
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, Security Engineering, C++ (Programming Language), User Accounts, Data Validation, Debugging, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Threat Modeling, Threat Management, Event Monitoring, Vulnerability Management, Security Information and Event Management (SIEM), Cybersecurity, Continuous Monitoring, Incident Response, Security Management, Network Security, Network Monitoring
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, IT Security Architecture, Application Security, Infrastructure Security, Cryptography, Regulation and Legal Compliance, Bash (Scripting Language), Encryption, Authorization (Computing), Risk Management, Virtualization
In summary, here are 10 of our most popular security analysis courses
- Cybersecurity: Developing a Program for Your Business: Kennesaw State University
- IBM and ISC2 Cybersecurity Specialist: ISC2
- Preparing for Google Cloud Certification: Cloud Security Engineer: Google Cloud
- Palo Alto Networks Security Operations Fundamentals: Palo Alto Networks
- Introduction to Applied Cryptography: University of Colorado System
- IBM Data Management: IBM
- IBM Data Analytics with Excel and R: IBM
- Business Statistics and Analysis: Rice University
- Software Requirements Prioritization: Risk Analysis: University of Colorado System
- Identifying Security Vulnerabilities in C/C++Programming: University of California, Davis