Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "control objectives for information and related technology (cobit)"
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Google Sheets, Business Analytics, Spreadsheet Software, Analytical Skills, Data Sharing, Data Cleansing, Data Processing, Data Strategy, Data Visualization Software, SQL
Skills you'll gain: Software Development Life Cycle, Linux Commands, Unit Testing, Bash (Scripting Language), Shell Script, Git (Version Control System), GitHub, Development Environment, Version Control, File Management, Jupyter, Software Engineering, Software Architecture, Application Deployment, Automation, Flask (Web Framework), Web Scraping, Python Programming, Open Source Technology, Application Development
University of Virginia
Skills you'll gain: Technology Strategies, Information Technology, Business Analysis, Business Strategy, Cyber Risk, Design Thinking, Cybersecurity, Business Modeling, Agile Methodology, Artificial Intelligence, Project Portfolio Management, Product Lifecycle Management, Technical Communication, Value Propositions
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Security Strategy, Risk Management Framework, Security Controls, Enterprise Security, Information Privacy
- Status: Free
Deep Teaching Solutions
Skills you'll gain: Learning Strategies, Time Management, Willingness To Learn, Mental Concentration, Creativity, Persistence, Self-Discipline, Stress Management, Self-Awareness, Adaptability
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Macquarie University
Skills you'll gain: Microsoft Excel, Dashboard, Excel Formulas, Spreadsheet Software, Data Visualization, Excel Macros, Data Validation, Data Analysis Expressions (DAX), Data Cleansing, Data Modeling, Business Intelligence, Predictive Modeling, Financial Modeling, Data Management, Microsoft 365, Consolidation, Data Integrity, Data Entry, Business Reporting, Productivity Software
Skills you'll gain: Computer Hardware, Technical Support, Software Installation, Help Desk Support, Information Technology, Hardware Troubleshooting, Microsoft Windows, Linux, Computer Networking, Computational Logic, Technical Documentation
Skills you'll gain: Open Web Application Security Project (OWASP), Security Controls, Risk Management, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, NIST 800-53, Cyber Security Policies, Cyber Risk, Safety Audits, Threat Detection, Compliance Auditing
Johns Hopkins University
Skills you'll gain: Rmarkdown, Version Control, Data Science, General Science and Research, Data Analysis, R Programming, Statistical Programming, Exploratory Data Analysis, Software Installation
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Peripheral Devices, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Cybersecurity, Configuration Management, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Security Awareness, Cloud Platforms
In summary, here are 10 of our most popular control objectives for information and related technology (cobit) courses
- Foundations: Data, Data, Everywhere: Google
- Applied Software Engineering Fundamentals: IBM
- Customer-Centric IT Strategy: University of Virginia
- The GRC Approach to Managing Cybersecurity: Kennesaw State University
- Learning How to Learn: Powerful mental tools to help you master tough subjects: Deep Teaching Solutions
- Google Cybersecurity: Google
- IT Fundamentals for Cybersecurity: IBM
- Excel Skills for Business: Macquarie University
- Technical Support Fundamentals: Google
- Play It Safe: Manage Security Risks: Google