Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "information technology security auditing"
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Cybersecurity, General Data Protection Regulation (GDPR), Threat Modeling, Data Ethics, Data Governance, Data Integrity, Cyber Risk, Data Encryption Standard, Vulnerability Assessments, Security Management, Vulnerability, Security Software, Risk Management, Compliance Management, Security Strategy, Data Access, NIST 800-53
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Cryptography, Public Key Infrastructure, Encryption, Network Security, Cybersecurity, Key Management, Data Security, Security Engineering, Data Encryption Standard, Blockchain, Security Management, Authentications, Wireless Networks, Virtual Private Networks (VPN), Hardware Architecture, Intellectual Property
- Status: Free Trial
Skills you'll gain: Digital Transformation, Cloud Computing Architecture, Stakeholder Engagement, Consulting, Systems Design, Relationship Management, Business Consulting, Cloud Computing, Technical Design, Solution Design, User Feedback, Product Strategy, Technical Consulting, Customer Engagement, Cybersecurity, System Implementation, Professional Networking, Project Management, SAP Applications, Test Planning
- Status: Free
Infosec
Skills you'll gain: Artificial Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Data Ethics, Governance, Law, Regulation, and Compliance, Program Development, Information Privacy, Legal Strategy, Data Security, Generative AI, Machine Learning, Computer Security, Ethical Standards And Conduct, Risk Management
- Status: Preview
Skills you'll gain: Scope Management, Quality Management, Resource Planning, Project Risk Management, Stakeholder Management, Cost Management, Communication Strategies, Resource Allocation, Project Management, Cost Estimation, Scheduling, Project Management Life Cycle, Information Technology, Leadership Studies, Project Schedules, Stakeholder Communications, Human Resources Management and Planning, Procurement
- Status: Free
Skills you'll gain: Cloud Computing Architecture, Cloud Security, Cloud Infrastructure, Cloud Computing, Cloud Applications, Cloud Platforms, IT Security Architecture, Cloud Services, Cloud Technologies, Infrastructure Security, Application Security, Data Security, Cybersecurity, Data Management, Computer Science, Risk Management Framework, Information Technology, Encryption, Configuration Management
- Status: Preview
University of Michigan
Skills you'll gain: Data Analysis, Analytical Skills, Experimentation, Critical Thinking, Research Design, Behavioral Economics, Decision Making, Regression Analysis, Statistical Inference, Probability, Correlation Analysis, Adaptability
- Status: Free Trial
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
- Status: Free Trial
Cisco Learning and Certifications
Skills you'll gain: Threat Modeling, Threat Detection, Cyber Operations, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, Security Management, Computer Security Incident Management, Cyber Attacks, Event Monitoring, Network Monitoring, Automation
- Status: NewStatus: Free Trial
Skills you'll gain: Identity and Access Management, Open Web Application Security Project (OWASP), IT Security Architecture, Security Testing, Single Sign-On (SSO), Data Security, Contingency Planning, Cryptography, Network Security, Application Security, Information Systems Security, Cryptographic Protocols, Asset Protection, Cloud Security, Computer Security Incident Management, Digital Assets, Public Key Cryptography Standards (PKCS), Incident Response, Risk Management Framework, Risk Management
- Status: Preview
University of Michigan
Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, Computer Networking, Encryption, Network Infrastructure, Innovation, Hypertext Markup Language (HTML)
- Status: Free Trial
Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security Awareness Training, Authentications, Authorization (Computing), Application Security, Security Controls, Personally Identifiable Information, Security Awareness, Identity and Access Management, Information Privacy, Cryptography, Malware Protection, Hardening, Encryption, Vulnerability Assessments, Multi-Factor Authentication, Data Integrity
In summary, here are 10 of our most popular information technology security auditing courses
- Data Security & Information Privacy:Â Macquarie University
- Applied Cryptography & Information Security:Â Macquarie University
- SAP Technology Consultant:Â SAP
- AI Security:Â Infosec
- Project Management for Information Technology and Management:Â Illinois Tech
- Certified Cloud Security Professional (CCSP):Â Infosec
- Mindware: Critical Thinking for the Information Age :Â University of Michigan
- Application Security for Developers and DevOps Professionals:Â IBM
- Security Operations Center (SOC):Â Cisco Learning and Certifications
- Certified Information Systems Security Professional (CISSP):Â Infosec