Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure configurations"
University of Colorado System
Skills you'll gain: Requirements Elicitation, Software Design Documents, Requirements Analysis, Security Requirements Analysis, Mockups, Interviewing Skills, User Requirements Documents, Storyboarding, Functional Requirement, Goal Setting, Software Development Methodologies, Software Documentation, Agile Methodology, Business Requirements, Unified Modeling Language, Risk Management Framework, System Requirements, Meeting Facilitation, Prototyping, Software Development Life Cycle
University at Buffalo
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Network Protocols, FinTech, Virtual Environment, Data Integrity, Emerging Technologies, Data Security, Data Validation, User Accounts
Fortinet, Inc.
Skills you'll gain: Virtual Private Networks (VPN), Firewall, Network Troubleshooting, Network Routing, Intrusion Detection and Prevention, Authentications, Network Monitoring, Event Monitoring, Lightweight Directory Access Protocols, Network Security, Network Administration, Security Information and Event Management (SIEM), Security Engineering, Threat Management, Network Performance Management, Systems Administration, Security Management, System Monitoring, Network Infrastructure, Identity and Access Management
Skills you'll gain: Cybersecurity, Application Security, Information Systems Security, Software Installation, System Configuration, Data Management, Information Management, Security Controls, Computer Hardware, Data Security, Hardware Architecture, Data Storage, Microsoft Windows, Firewall, Encryption, Identity and Access Management
- Status: Free
Princeton University
Skills you'll gain: Blockchain, Cryptography, Encryption, Payment Systems, FinTech, Key Management, Digital Assets, Network Protocols, Cybersecurity, Transaction Processing, Distributed Computing, Emerging Technologies, Scripting, Financial Regulation, Public Affairs, Market Dynamics
Google Cloud
Skills you'll gain: Cloud Management, Serverless Computing, Google Cloud Platform, Digital Transformation, Data Governance, Cloud Services, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Cloud Infrastructure, Data Strategy, Artificial Intelligence and Machine Learning (AI/ML), Application Programming Interface (API), Real Time Data, Business Transformation, Data Management, Hybrid Cloud Computing, Data Warehousing, Artificial Intelligence, Cloud Computing, Data Security
Google Cloud
Skills you'll gain: Email Security, Google Workspace, Mobile Security, Security Management, Cloud Security, Application Security, Data Security, Security Controls, Identity and Access Management, Continuous Monitoring, Authentications, Data Loss Prevention, Multi-Factor Authentication
- Status: AI skills
Google Cloud
Skills you'll gain: Cloud Security, Identity and Access Management, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Management, Cyber Threat Hunting, Risk Management Framework, Cyber Operations, Vulnerability Management, Continuous Monitoring, Event Monitoring, Disaster Recovery, Generative AI, DevSecOps, Cloud Computing, Data Security, Personally Identifiable Information, Google Cloud Platform, Cybersecurity
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Cryptographic Protocols, Data Security, Email Security, Computer Security Awareness Training, Advanced Encryption Standard (AES), Security Awareness, Key Management, Secure Coding, Technical Support and Services, Information Technology, Cyber Security Strategy
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Cyber Threat Intelligence, Threat Modeling, Malware Protection, Network Security, Infrastructure Security, Firewall, Security Awareness, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Vulnerability Assessments, Cloud Computing, System Configuration
Cisco Learning and Certifications
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Malware Protection, Network Monitoring, Network Administration, TCP/IP, Network Infrastructure, Infrastructure Security, Intrusion Detection and Prevention, Network Protocols, Load Balancing, Firewall, General Networking, Authorization (Computing), Web Applications, Security Controls, Identity and Access Management, Web Servers, Authentications, Application Servers
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Security Controls, Virtual Private Networks (VPN), Cloud Computing, Firewall, Network Security, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Authentications, Public Cloud
In summary, here are 10 of our most popular secure configurations courses
- Requirements Engineering: Secure Software Specifications:Â University of Colorado System
- Blockchain Basics:Â University at Buffalo
- Fortinet Network Security:Â Fortinet, Inc.
- Essential Aspects of Software, Hardware, and Data Backup:Â Microsoft
- Bitcoin and Cryptocurrency Technologies:Â Princeton University
- Google Cloud Digital Leader Training:Â Google Cloud
- Google Workspace Security:Â Google Cloud
- Google Cloud Cybersecurity:Â Google Cloud
- Cybersecurity Fundamentals:Â IBM
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks