Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "information technology (it) operations"
Skills you'll gain: Open Web Application Security Project (OWASP), Security Controls, Risk Management, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, NIST 800-53, Cyber Security Policies, Cyber Risk, Threat Detection, Information Assurance, Compliance Auditing
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
University of Minnesota
Skills you'll gain: Enterprise Resource Planning, Business Systems, Change Management, Business Technologies, Organizational Change, System Implementation, IT Management, Business Process, Business Solutions, Business Management, Business
Skills you'll gain: Security Controls, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Security Policies, Network Analysis, Security Information and Event Management (SIEM), Ethical Standards And Conduct, SQL
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Puppet (Configuration Management Tool), CI/CD, Containerization, Debugging, Bash (Scripting Language), Infrastructure as Code (IaC), Docker (Software), Continuous Deployment, Continuous Integration, Technical Communication, Network Troubleshooting, Linux Commands, Linux, Scripting, Automation, Python Programming, Computer Programming
- Status: [object Object]
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Business Software, Computer Hardware, Cybersecurity, Desktop Support, Virtual Private Networks (VPN), Network Troubleshooting, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, Operating Systems, Network Protocols, TCP/IP, Application Security, Microsoft Teams, Productivity Software, Information Systems Security, Multi-Factor Authentication
University of California, Irvine
Skills you'll gain: Systems Development, Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Safety and Security, Information Technology, Information Privacy, Computer Security Awareness Training, Technology Strategies, Data Management, Digital Communications
Skills you'll gain: IT Management, Business Transformation, Workforce Management, Digital Transformation, Technology Strategies, Human Resource Strategy, Operational Efficiency, Information Technology, Product Strategy, Profit and Loss (P&L) Management, Financial Management, Organizational Change, Change Management, Product Marketing
University at Buffalo
Skills you'll gain: Model Based Systems Engineering, Systems Engineering, Product Lifecycle Management, Intrusion Detection and Prevention, Security Controls, Performance Measurement, Anomaly Detection, Machine Controls, Incident Response, Digital Transformation, Vulnerability Assessments, Software Development Life Cycle, Product Engineering, Cybersecurity, Supply Chain Management, Manufacturing Processes, Supply Chain Planning, Data Sharing, Manufacturing Operations, Constructive Feedback
SkillUp EdTech
Skills you'll gain: Email Security, Productivity Software, Microsoft Outlook, Microsoft Teams, Presentations, Calendar Management, Microsoft PowerPoint, Gmail, Google Docs, Microsoft Windows, Microsoft Word, Spreadsheet Software, Setting Appointments, Meeting Facilitation, Google Sheets, Data Visualization, Excel Formulas, Slack (Software), Microsoft 365, Document Management
Palo Alto Networks
Skills you'll gain: Cyber Operations, Endpoint Detection and Response, Endpoint Security, Security Information and Event Management (SIEM), Zero Trust Network Access, Cybersecurity, Cyber Threat Intelligence, Threat Modeling, Continuous Monitoring, Security Controls, IT Security Architecture, Threat Detection, Incident Response, Malware Protection, Automation, Authentications, Data Lakes
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
In summary, here are 10 of our most popular information technology (it) operations courses
- Play It Safe: Manage Security Risks:Â Google
- IBM Cybersecurity Analyst:Â IBM
- Enterprise Systems:Â University of Minnesota
- Foundations of Cybersecurity:Â Google
- Google IT Automation with Python:Â Google
- Microsoft IT Support Specialist:Â Microsoft
- Data, Security, and Privacy:Â University of California, Irvine
- Two Speed IT: How Companies Can Surf the Digital Wave, a BCG Perspective: CentraleSupélec
- Digital Manufacturing & Design Technology:Â University at Buffalo
- Office Productivity Software:Â SkillUp EdTech