Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "request response"
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Threat Management, Cyber Operations, Cybersecurity, Disaster Recovery, Cyber Threat Hunting, Security Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity
- Status: New AI skills
Google
Skills you'll gain: Threat Modeling, Network Security, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Stakeholder Communications, Intrusion Detection and Prevention, Cyber Threat Intelligence, Threat Management, Cybersecurity, Network Protocols, Cloud Security, Vulnerability Assessments, Network Architecture, Operating Systems, File Systems, Security Controls, Debugging, Python Programming
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Kennesaw State University
Skills you'll gain: Network Security, Incident Response, Vulnerability Management, Cybersecurity, Contingency Planning, Cyber Governance, Cyber Attacks, Disaster Recovery, Computer Security Incident Management, Cyber Security Policies, Security Management, Firewall, Network Monitoring, Cyber Security Strategy, Crisis Management, Vulnerability Assessments, Cyber Security Assessment, Cyber Risk, Network Protocols, Risk Management
Johns Hopkins University
Skills you'll gain: Triage, Crisis Intervention, Emergency Response, Trauma Care, Patient Assistance, Interpersonal Communications, Community Mental Health Services, Mental Health, Stress Management, Patient Referral, Risk Analysis
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, HTML and CSS, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Responsive Web Design, Hypertext Markup Language (HTML), Application Development, TCP/IP, Scripting, MySQL
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Application Development, Linux Commands, TCP/IP, General Networking, Scripting, MySQL, Data Structures
- Status: New
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, Crisis Management, Incident Response, OpenAI, Data Ethics, Computer Security Incident Management, Artificial Intelligence, Personalized Service, Business Ethics, Information Privacy, Personally Identifiable Information, Cross-Functional Collaboration, Threat Detection, Threat Management, Expense Management, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Creative Thinking, Creative Problem-Solving
Skills you'll gain: Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Security Information and Event Management (SIEM), Security Controls, Information Systems Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), Auditing, Compliance Auditing
Multiple educators
Skills you'll gain: Software Development Life Cycle, Computing Platforms, Network Security, Incident Response, Cloud Computing Architecture, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Peripheral Devices, Configuration Management, Cybersecurity, Cloud Security, Cloud Infrastructure, Cloud Applications, Network Troubleshooting
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Record Keeping, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
In summary, here are 10 of our most popular request response courses
- Cyber Incident Response:Â Infosec
- Google Cybersecurity:Â Google
- Incident Response and Digital Forensics:Â IBM
- IBM Cybersecurity Analyst:Â IBM
- Managing Cybersecurity:Â Kennesaw State University
- Psychological First Aid:Â Johns Hopkins University
- Akamai Customer Consulting and Support:Â Akamai Technologies, Inc.
- Akamai Network Engineering:Â Akamai Technologies, Inc.
- Generative AI Cybersecurity & Privacy for Leaders:Â Vanderbilt University
- Play It Safe: Manage Security Risks:Â Google