Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security benchmarking & compliance"
- Status: Free
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Endpoint Detection and Response, Security Information and Event Management (SIEM), IT Automation, Automation, Event Monitoring, Cyber Threat Hunting, Cyber Threat Intelligence, Continuous Monitoring, System Monitoring, Security Management, Anomaly Detection, Cybersecurity, Security Controls, Interactive Data Visualization, Artificial Intelligence and Machine Learning (AI/ML)
- Status: Free
Coursera Instructor Network
Skills you'll gain: Occupational Safety and Health Administration (OSHA), Occupational Safety And Health, Safety Training, Health And Safety Standards, Safety Culture, Compliance Management, Regulatory Compliance, Labor Law
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Peripheral Devices, Cybersecurity, Configuration Management, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Security Awareness, Cloud Platforms
Skills you'll gain: CI/CD, Istio, Open Web Application Security Project (OWASP), Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Jenkins, Kubernetes, Bash (Scripting Language), Cloud Services, DevOps, Git (Version Control System), Jupyter, Grafana
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Systems Development Life Cycle, Information Assurance, Internal Controls, Information Systems Security, Compliance Auditing, Risk Management, Security Controls, Change Management, System Implementation, System Monitoring, Risk Analysis, Risk Mitigation, Software Development
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Infrastructure As A Service (IaaS), Application Deployment, Cloud Storage, Cloud Applications, Kubernetes, Cloud Computing, CI/CD, Cloud Computing Architecture, Cloud Security, Load Balancing, Service Level Agreement, Infrastructure as Code (IaC), Microservices, Service Level, Data Storage, Network Infrastructure, Network Architecture
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, General Networking, Routing Protocols, Network Protocols, Network Routing, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks, Data Integrity
Skills you'll gain: Data Ethics, Data Analysis, Data Security, Google Sheets, Databases, Data Access, Data Storage, Data Quality, Data Integrity, Data Management, Data Collection, Data Manipulation, Relational Databases, SQL, Metadata Management, Unstructured Data
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Information and Event Management (SIEM), Security Awareness
Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, Infrastructure as Code (IaC), Cyber Security Policies, Security Controls, Security Strategy, Identity and Access Management, Threat Detection
In summary, here are 10 of our most popular security benchmarking & compliance courses
- Automated Cyber Security Incident Response: EDUCBA
- Introduction to OSHA: Safety Standards and Compliance: Coursera Instructor Network
- IBM and ISC2 Cybersecurity Specialist: ISC2
- IBM DevOps and Software Engineering: IBM
- Information Systems Auditing, Controls and Assurance: The Hong Kong University of Science and Technology
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Architecting with Google Compute Engine: Google Cloud
- Assets, Threats, and Vulnerabilities: Google
- The Bits and Bytes of Computer Networking: Google
- Prepare Data for Exploration: Google