Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security analysis and reporting"
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Peripheral Devices, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Cybersecurity, Configuration Management, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Security Awareness, Cloud Platforms
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, NIST 800-53, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Penetration Testing, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Personally Identifiable Information, Identity and Access Management, Web Applications, Data Validation
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
Skills you'll gain: Rmarkdown, Ggplot2, R Programming, Data Analysis, Tidyverse (R Package), Data Visualization Software, Data Cleansing, Statistical Analysis, Data Manipulation, Package and Software Management, Data Structures
University of Minnesota
Skills you'll gain: Business Systems Analysis, Systems Analysis, Requirements Analysis, Business Requirements, User Requirements Documents, Requirements Management, Business Process, Business Process Modeling, Feasibility Studies, Decision Making
- Status: [object Object]
Skills you'll gain: Data Storytelling, Dashboard, Data Visualization Software, Plotly, Data Presentation, Data Wrangling, Data Visualization, SQL, Generative AI, Interactive Data Visualization, Exploratory Data Analysis, Data Cleansing, Big Data, Jupyter, Matplotlib, Data Analysis, Statistical Analysis, Pandas (Python Package), Excel Formulas, Professional Networking
University of Michigan
Skills you'll gain: Data Structures, Python Programming, Data Manipulation, Development Environment, File Management, Data Analysis, Computer Programming, Software Installation
University of Michigan
Skills you'll gain: Programming Principles, Computer Programming, Python Programming, Computational Thinking, Software Installation, Development Environment
University of Michigan
Skills you'll gain: Matplotlib, Network Analysis, Feature Engineering, Plot (Graphics), Data Visualization Software, Interactive Data Visualization, Pandas (Python Package), Applied Machine Learning, Supervised Learning, Text Mining, Scikit Learn (Machine Learning Library), Network Model, Jupyter, NumPy, Graph Theory, Data Manipulation, Natural Language Processing, Data Analysis, Data Processing, Unstructured Data
In summary, here are 10 of our most popular security analysis and reporting courses
- Google Cybersecurity: Google
- IT Fundamentals for Cybersecurity: IBM
- IBM and ISC2 Cybersecurity Specialist: IBM
- Assets, Threats, and Vulnerabilities: Google
- Identifying Security Vulnerabilities: University of California, Davis
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- Data Analysis with R Programming: Google
- Analysis for Business Systems: University of Minnesota
- IBM Data Analyst: IBM
- Python Data Structures: University of Michigan