Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "federal information security management act"
Status: NewStatus: Free TrialSkills you'll gain: Public Key Infrastructure, Cryptography, Encryption, Data Security, Cryptographic Protocols, Data Integrity, Information Systems Security, Key Management, Network Security, Information Privacy, Authentications, Digital Communications
Status: NewStatus: Free TrialSkills you'll gain: IT Security Architecture, Threat Modeling, Application Security, Cloud Computing Architecture, Cloud Computing, Security Engineering, Cloud Security, Systems Architecture, Security Controls, Threat Management, Software As A Service, Infrastructure As A Service (IaaS), Computer Security, Threat Detection, Platform As A Service (PaaS), Cyber Security Assessment, Role-Based Access Control (RBAC), Data Integrity
Status: NewStatus: Free TrialSkills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Identity and Access Management, Security Management, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection
Status: Free TrialSkills you'll gain: Authorization (Computing), Authentications, Azure DevOps, DevSecOps, Security Controls, Performance Tuning, Identity and Access Management, Microsoft Azure, System Monitoring, DevOps, Continuous Monitoring, Role-Based Access Control (RBAC), Personally Identifiable Information, Application Performance Management, Vulnerability Scanning, Azure Active Directory
Status: Free TrialUniversity of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Data Store, Cryptographic Protocols, Application Security, Cryptography
Status: Free TrialRutgers the State University of New Jersey
Skills you'll gain: Strategic Sourcing, Demand Planning, Procurement, Supplier Relationship Management, Supply Chain, Supply Chain Planning, Operational Efficiency, Customer Demand Planning, Supply Chain Management, Presentations, Operations, Logistics, Transportation Management, Forecasting, Inventory and Warehousing, Cost Reduction, Decision Making
Status: NewStatus: Free TrialSkills you'll gain: Security Controls

Skills you'll gain: Product Roadmaps, Product Development, Product Management, Product Planning, Product Requirements, Product Strategy, Project Management Software, Release Management
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: Incident Response, Incident Management, Threat Modeling, Cyber Governance, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Threat Management, Cyber Risk, Cyber Security Policies, Cybersecurity, Intrusion Detection and Prevention, Governance Risk Management and Compliance, Cyber Security Assessment, Cyber Operations, Compliance Management, Governance, Risk Management, Risk Control

University of Illinois at Urbana-Champaign
Skills you'll gain: Data Storytelling, Management Accounting, Fund Accounting, Operations Management, Mergers & Acquisitions, Financial Statement Analysis, Marketing, Risk Management, Machine Learning Algorithms, Business Strategy, Financial Auditing, Descriptive Statistics, Variance Analysis, Process Improvement, Data Governance, Generative AI, Financial Market, Strategic Decision-Making, Corporate Tax, Global Marketing

Skills you'll gain: Security Testing, Vulnerability Scanning, Secure Coding, Data Security, Application Security, Cyber Security Assessment, Vulnerability Assessments, Web Applications, Web Servers, Information Privacy, SQL
Status: Free TrialSkills you'll gain: Infrastructure as Code (IaC), Cloud Management, Puppet (Configuration Management Tool), Infrastructure As A Service (IaaS), Cloud Services, Cloud Computing, Cloud Infrastructure, Virtual Machines, Software As A Service, Change Control, Terraform, System Monitoring, Incident Management, Configuration Management, Release Management, Cloud Storage, Disaster Recovery, Automation, Scalability, Service Level
In summary, here are 10 of our most popular federal information security management act courses
- (SSCP) Systems Security Certified Practitioner: Unit 2: Pearson
- CISSP Domain 3: Security Architecture and Engineering: Infosec
- (SSCP) Systems Security Certified Practitioner: Unit 3: Pearson
- Design Security and Monitor Strategies in Azure: Whizlabs
- Networking and Security in iOS Applications: University of California, Irvine
- Supply Chain Management Strategy: Rutgers the State University of New Jersey
- Certified Cloud Security Professional (CCSP): Unit 1: Pearson
- Build a Product Roadmap with Aha!: Coursera
- Cyber Security: Essentials for Governance, Risk & Compliance: Macquarie University
- Financial Management Graduate Certificate: University of Illinois at Urbana-Champaign










