Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security operations"
Skills you'll gain: Security Controls, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Security Policies, Network Analysis, Security Information and Event Management (SIEM), Ethical Standards And Conduct, SQL
- Status: Free
Infosec
Skills you'll gain: Blockchain, Network Security, Application Security, Security Engineering, Computer Security, Infrastructure Security, Information Systems Security, Cybersecurity, Data Security, Cryptography, Cryptographic Protocols, Secure Coding, Encryption, Vulnerability Assessments, Scalability, Distributed Computing, Data Integrity, Other Programming Languages, Algorithms
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Security Management, Threat Management, Intelligence Collection and Analysis, International Relations, Public Safety and National Security, Security Awareness, Risk Management, Threat Detection, Governance, Law, Regulation, and Compliance, Innovation, Policy Development
Skills you'll gain: Cloud Computing Architecture, Technical Support, Technical Support and Services, Cloud Services, Cybersecurity, Computing Platforms, Hardware Troubleshooting, Computer Hardware, IT Service Management, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Peripheral Devices, Encryption, Data Storage, Software Development Life Cycle, Professional Networking, Information Technology, Cloud Computing, Interviewing Skills
Rutgers the State University of New Jersey
Skills you'll gain: Strategic Sourcing, Lean Six Sigma, Lean Manufacturing, Demand Planning, Procurement, Supplier Relationship Management, Manufacturing Operations, Forecasting, Process Improvement, Supplier Management, Operations Management, Purchasing, Supply Management, Operational Efficiency, Warehouse Management, Supply Chain Planning, Sales Management, Inventory and Warehousing, Inventory Management System, Transportation, Supply Chain, and Logistics
Palo Alto Networks
Skills you'll gain: Cyber Operations, Endpoint Detection and Response, Endpoint Security, Security Information and Event Management (SIEM), Zero Trust Network Access, Cybersecurity, Cyber Threat Intelligence, Threat Modeling, Continuous Monitoring, Security Controls, IT Security Architecture, Threat Detection, Incident Response, Malware Protection, Automation, Authentications, Data Lakes
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Law, Regulation, and Compliance, Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
Skills you'll gain: Identity and Access Management, IT Security Architecture, Authentications, Continuous Monitoring, Business Continuity, Security Controls, Secure Coding, Security Testing, Cryptography, Disaster Recovery, Vulnerability Assessments, Cyber Security Assessment, Application Security, Incident Management, Security Engineering, Data Security, Network Security, User Provisioning, OSI Models, Data Loss Prevention
Skills you'll gain: Agile Software Development, Cloud Computing Architecture, Cloud Services, Agile Methodology, DevOps, Kanban Principles, Cloud Security, Cloud Infrastructure, Cloud Platforms, Cloud Computing, Agile Project Management, Cloud-Native Computing, User Story, Cloud Storage, Sprint Retrospectives, Sprint Planning, Workflow Management, CI/CD, Test Driven Development (TDD), Scrum (Software Development)
- Status: Free
National Taiwan University
Skills you'll gain: Operations Research, Mathematical Modeling, Process Optimization, Applied Mathematics, Business Modeling, Industrial Engineering, Operations Management, Inventory Control, Resource Allocation, Business Analytics, Production Planning, Microsoft Excel, Scheduling, Linear Algebra, Decision Making, Portfolio Management, Complex Problem Solving
Searches related to security operations
In summary, here are 10 of our most popular security operations courses
- Foundations of Cybersecurity:Â Google
- Blockchain Security:Â Infosec
- International Security Management:Â Erasmus University Rotterdam
- IBM IT Support:Â IBM
- Supply Chain Management:Â Rutgers the State University of New Jersey
- Palo Alto Networks Security Operations Fundamentals:Â Palo Alto Networks
- Network Security:Â ISC2
- Connect and Protect: Networks and Network Security:Â Google
- Cybersecurity: Developing a Program for Your Business:Â Kennesaw State University
- CISSP Certified Information Systems Security Professional:Â Packt