Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure configurations"
- Status: New
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, Crisis Management, Incident Response, OpenAI, Data Ethics, Computer Security Incident Management, Artificial Intelligence, Personalized Service, Business Ethics, Information Privacy, Personally Identifiable Information, Cross-Functional Collaboration, Threat Detection, Threat Management, Expense Management, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Creative Thinking, Creativity
- Status: New
Skills you'll gain: NoSQL, Data Warehousing, SQL, Apache Hadoop, Extract, Transform, Load, Apache Airflow, Data Security, Linux Commands, Data Migration, Database Design, Data Governance, MySQL, Apache Spark, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Architecture
Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Risk Mitigation, Security Information and Event Management (SIEM), Security Controls, Threat Modeling, Security Strategy, Continuous Monitoring, Data Security, Information Systems Security, Computer Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), Auditing
- Status: New
Microsoft
Skills you'll gain: Cascading Style Sheets (CSS), GitHub, Database Management, C# (Programming Language), Azure DevOps, HTML and CSS, SQL, CI/CD, ASP.NET, Load Balancing, Version Control, Relational Databases, Git (Version Control System), Role-Based Access Control (RBAC), Application Deployment, Scalability, Full-Stack Web Development, Programming Principles, Graph Theory, User Interface (UI)
Google Cloud
Skills you'll gain: Cloud Management, Serverless Computing, Google Cloud Platform, Digital Transformation, Data Governance, Cloud Services, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Cloud Infrastructure, Data Strategy, Artificial Intelligence and Machine Learning (AI/ML), Application Programming Interface (API), Real Time Data, Business Transformation, Data Management, Hybrid Cloud Computing, Data Warehousing, Artificial Intelligence, Cloud Computing, Data Security
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
Skills you'll gain: Data Ethics, Data Analysis, Data Security, Google Sheets, Databases, Data Storage, Data Quality, Data Integrity, Data Management, Data Collection, Data Manipulation, Relational Databases, SQL, Metadata Management, Unstructured Data
Skills you'll gain: Network Security, Cybersecurity, Encryption, Security Awareness, Data Security, Cryptography, Threat Modeling, Security Management, Computer Security Awareness Training, Wireless Networks, Hardening, Firewall, Malware Protection, Authentications, Identity and Access Management, Authorization (Computing), Technical Support, Generative AI
Skills you'll gain: Serverless Computing, Digital Transformation, Cloud Services, Data Ethics, Cloud Infrastructure, Google Cloud Platform, Application Programming Interface (API), Business Transformation, Applied Machine Learning, Hybrid Cloud Computing, Image Analysis, Infrastructure As A Service (IaaS), Cloud Computing, Public Cloud, Containerization, Cloud Computing Architecture, Multi-Cloud, Machine Learning, Software As A Service, Computer Vision
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Information and Event Management (SIEM), Security Awareness
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Regulatory Compliance, General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Compliance Auditing, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Regulatory Requirements, Communication Planning, Risk Management, Internal Communications, Procedure Development, Data Security, Continuous Monitoring, Compliance Reporting, Business Ethics, Internal Controls, Risk Analysis
Skills you'll gain: Network Troubleshooting, Hardware Troubleshooting, Command-Line Interface, Desktop Support, Operating Systems, Network Administration, System Support, System Configuration, Computer Hardware, Network Security, Microsoft Windows, Technical Support and Services, General Networking, Technical Support, Mac OS, Linux, Mobile Security, Infrastructure Security, Computer Displays, Firewall
In summary, here are 10 of our most popular secure configurations courses
- Generative AI Cybersecurity & Privacy for Leaders:Â Vanderbilt University
- IBM Data Architecture:Â IBM
- Play It Safe: Manage Security Risks:Â Google
- Microsoft Full-Stack Developer:Â Microsoft
- Google Cloud Digital Leader Training:Â Google Cloud
- Assets, Threats, and Vulnerabilities:Â Google
- Prepare Data for Exploration:Â Google
- IT Security: Defense against the digital dark arts :Â Google
- Digital Transformation Using AI/ML with Google Cloud:Â Google Cloud
- Security Analyst Fundamentals:Â IBM