Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "monitoring and alerting setup"
Skills you'll gain: Package and Software Management, File Systems, Microsoft Windows, Desktop Support, Linux, Operating Systems, OS Process Management, Linux Administration, Remote Access Systems, System Monitoring, Command-Line Interface, User Accounts, Systems Administration, Windows PowerShell, Technical Support and Services, File Management, Linux Commands, Software Installation, Identity and Access Management, Authorization (Computing)
Skills you'll gain: Data Storytelling, Data Presentation, Interactive Data Visualization, Data Visualization Software, Dashboard, IBM Cognos Analytics, Tree Maps, Scatter Plots, Data Analysis, Pivot Tables And Charts, Microsoft Excel, Histogram
- Status: New AI skills
Google
Skills you'll gain: Storyboarding, Wireframing, UI/UX Research, Responsive Web Design, User Experience Design, Design Thinking, User Research, Information Architecture, Figma (Design Software), Usability Testing, User Story, Web Design, Design Reviews, Usability, Presentations, Design Research, Persona (User Experience), Ideation, User Centered Design, Mockups
Skills you'll gain: React Native, Jest (JavaScript Testing Framework), Version Control, User Research, UI/UX Research, Usability Testing, Unix Commands, Restful API, Git (Version Control System), Persona (User Experience), GitHub, Interaction Design, User Experience Design, SQL, User Interface and User Experience (UI/UX) Design, Mobile Development, Design Research, Cross Platform Development, React.js, Web Development Tools
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Continuous Integration, Software Configuration Management, Software Development Tools, Code Review, Remote Access Systems, Issue Tracking, Command-Line Interface
Skills you'll gain: Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix Shell, Query Languages, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Record Keeping, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
- Status: AI skills
Skills you'll gain: Istio, Node.JS, Software Development Life Cycle, Kubernetes, Unit Testing, Object-Relational Mapping, Cloud Computing Architecture, Server Side, Application Deployment, React Redux, Cloud Services, Cloud-Native Computing, OpenShift, Git (Version Control System), Full-Stack Web Development, HTML and CSS, Cloud Computing, Jupyter, Generative AI, Interviewing Skills
- Status: AI skills
Skills you'll gain: Dashboard, Data Visualization Software, Data Wrangling, Data Visualization, SQL, Supervised Learning, Feature Engineering, Plotly, Interactive Data Visualization, Jupyter, Statistical Reporting, Exploratory Data Analysis, Data Mining, Data Cleansing, Matplotlib, Data Analysis, Unsupervised Learning, Generative AI, Pandas (Python Package), Professional Networking
University of Michigan
Skills you'll gain: Data Structures, Python Programming, Data Manipulation, Development Environment, File Management, Data Analysis, Computer Programming, Software Installation
Skills you'll gain: Project Management Life Cycle, Change Management, Organizational Structure, Project Management, Project Coordination, Organizational Skills, Agile Methodology, Project Planning, Waterfall Methodology, Cross-Functional Collaboration, Communication, Decision Making
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
In summary, here are 10 of our most popular monitoring and alerting setup courses
- Operating Systems and You: Becoming a Power User: Google
- Data Visualization and Dashboards with Excel and Cognos: IBM
- Google UX Design: Google
- Meta React Native: Meta
- Introduction to Git and GitHub: Google
- Tools of the Trade: Linux and SQL: Google
- Sound the Alarm: Detection and Response: Google
- IBM Full Stack Software Developer: IBM
- IBM Data Science: IBM
- Python Data Structures: University of Michigan