Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security operations (secops)"
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Cyber Operations, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Threat Management
- Status: Free
Duke University
Skills you'll gain: Market Dynamics, Operating Cost, Transportation Operations, Production Process, Process Engineering, Market Trend, Manufacturing Operations, Cost Estimation, Global Marketing, Market Analysis, Natural Resource Management, Resource Utilization
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Palo Alto Networks
Skills you'll gain: Cyber Operations, Endpoint Detection and Response, Endpoint Security, Security Information and Event Management (SIEM), Zero Trust Network Access, Cybersecurity, Cyber Threat Intelligence, Threat Modeling, Continuous Monitoring, Security Controls, IT Security Architecture, Threat Detection, Incident Response, Malware Protection, Automation, Authentications, Data Lakes
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Application Development, Linux Commands, TCP/IP, General Networking, Scripting, MySQL, Data Structures
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Information and Event Management (SIEM), Security Awareness
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
Skills you'll gain: Network Security, Incident Response, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Configuration Management, Cybersecurity, Security Awareness, Security Management, Computer Security Incident Management, Cyber Attacks, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)
Skills you'll gain: Identity and Access Management, IT Security Architecture, Authentications, Continuous Monitoring, Business Continuity, Security Controls, Secure Coding, Security Testing, Cryptography, Disaster Recovery, Vulnerability Assessments, Cyber Security Assessment, Application Security, Incident Management, Security Engineering, Data Security, Network Security, User Provisioning, OSI Models, Data Loss Prevention
- Status: Free
Campus BBVA
Skills you'll gain: Incident Management, Crisis Management, Security Information and Event Management (SIEM), Data Security, Cybersecurity, Cyber Attacks, Security Strategy, Information Systems Security, Cyber Operations, Information Assurance, Data Processing, Security Awareness, Network Security, Anomaly Detection, Data Science, Time Series Analysis and Forecasting, Unsupervised Learning
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Application Security, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls
In summary, here are 10 of our most popular security operations (secops) courses
- In the Trenches: Security Operations Center :Â EC-Council
- Oil & Gas Industry Operations and Markets :Â Duke University
- IBM Cybersecurity Analyst:Â IBM
- Palo Alto Networks Security Operations Fundamentals:Â Palo Alto Networks
- Akamai Network Engineering:Â Akamai Technologies, Inc.
- Security Analyst Fundamentals:Â IBM
- Operating Systems: Overview, Administration, and Security:Â IBM
- Certified in Cybersecurity:Â ISC2
- CISSP Certified Information Systems Security Professional:Â Packt
- Data & Cybersecurity:Â Campus BBVA