Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "operating system security"
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Infosec
Skills you'll gain: File Systems, Microsoft Windows, File Management, Operating Systems, Data Structures, Data Validation, Data Storage Technologies, Data Integrity, Data Storage, System Configuration
Skills you'll gain: Security Controls, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Security Policies, Network Analysis, Security Information and Event Management (SIEM), Ethical Standards And Conduct, SQL
Microsoft
Skills you'll gain: Business Software, Computer Hardware, Hardware Architecture, Generative AI, Operating Systems, Data Storage Technologies, Computer Systems, Data Maintenance, Enterprise Security, System Software, Information Technology, OS Process Management, Data Storage, System Configuration, Microsoft Windows, Technical Support, Servers, Cybersecurity
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
Skills you'll gain: Cloud Computing Architecture, Peripheral Devices, Cloud Services, Cybersecurity, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Cloud Platforms, Encryption, Data Storage, Cyber Attacks, Software Development Life Cycle, Networking Hardware, Application Development, Information Technology, Cloud Computing, Databases, Computer Hardware, Computer Systems
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Puppet (Configuration Management Tool), CI/CD, Containerization, Debugging, Bash (Scripting Language), Infrastructure as Code (IaC), Docker (Software), Continuous Deployment, Continuous Integration, Technical Communication, Network Troubleshooting, Linux Commands, Linux, Scripting, Automation, Python Programming, Computer Programming
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Identity and Access Management, Business Risk Management, Security Controls
University of California, Irvine
Skills you'll gain: Embedded Systems, Internet Of Things, General Networking, Operating Systems, Wireless Networks, Network Protocols, Computer Hardware, Emerging Technologies, System Design and Implementation, Software Design
Skills you'll gain: Open Web Application Security Project (OWASP), Security Controls, Risk Management, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, NIST 800-53, Cyber Security Policies, Cyber Risk, Safety Audits, Threat Detection, Compliance Auditing
University of California, Irvine
Skills you'll gain: Test Planning, Embedded Systems, Linux, Internet Of Things, Embedded Software, Functional Requirement, Debugging, General Networking, Hardware Design, Operating Systems, Requirements Analysis, Electronic Hardware, System Design and Implementation, Development Testing, C (Programming Language), Basic Electrical Systems, Application Programming Interface (API), TCP/IP, Wireless Networks, Integrated Development Environments
Searches related to operating system security
In summary, here are 10 of our most popular operating system security courses
- IBM Cybersecurity Analyst: IBM
- Windows OS Forensics: Infosec
- Foundations of Cybersecurity: Google
- Introduction to Computers: Microsoft
- Computer Networks and Network Security: IBM
- Information Technology (IT) and Cloud Fundamentals: IBM
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- Google IT Automation with Python: Google
- Tools for Security Specialists: Codio
- Introduction to the Internet of Things and Embedded Systems: University of California, Irvine