Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "developing a security strategy for edge networks"
- Status: New AI skills
Google
Skills you'll gain: Threat Modeling, Network Security, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Stakeholder Communications, Intrusion Detection and Prevention, Cyber Threat Intelligence, Threat Management, Cybersecurity, Network Protocols, Vulnerability Assessments, Network Architecture, Event Monitoring, Operating Systems, File Systems, Security Controls, Debugging, Python Programming
DeepLearning.AI
Skills you'll gain: Computer Vision, Deep Learning, Image Analysis, Natural Language Processing, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Tensorflow, Supervised Learning, Keras (Neural Network Library), Artificial Intelligence, Applied Machine Learning, PyTorch (Machine Learning Library), Machine Learning, Debugging, Performance Tuning, Machine Learning Methods, Python Programming, Data-Driven Decision-Making, Text Mining, Machine Learning Algorithms
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
Multiple educators
Skills you'll gain: Unsupervised Learning, Supervised Learning, Artificial Intelligence and Machine Learning (AI/ML), Classification And Regression Tree (CART), Applied Machine Learning, Machine Learning Algorithms, Machine Learning, Jupyter, Data Ethics, Decision Tree Learning, Tensorflow, Scikit Learn (Machine Learning Library), NumPy, Predictive Modeling, Deep Learning, Artificial Intelligence, Reinforcement Learning, Random Forest Algorithm, Feature Engineering, Python Programming
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Services, Application Deployment, Virtual Machines, Security Controls, Cloud Computing, Threat Management, Generative AI, Application Security, Data Storage Technologies, Virtual Private Networks (VPN)
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Network Security, Hardening, Network Protocols, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, General Networking, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)
Copenhagen Business School
Skills you'll gain: Business Strategy, Business Planning, Strategic Decision-Making, Plan Execution, Goal Setting, Organizational Strategy, Strategic Thinking, Resource Management, Peer Review, Competitive Analysis, Strategic Leadership, Innovation, Organizational Structure, Project Implementation, Market Analysis, Risk Analysis, Change Management, Business Strategies, Business Management, Business
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
- Status: AI skills
Skills you'll gain: Istio, Software Development Life Cycle, Kubernetes, Unit Testing, Cloud Computing Architecture, Application Deployment, React Redux, Cloud Services, Django (Web Framework), Cloud-Native Computing, Object-Relational Mapping, OpenShift, Git (Version Control System), Cloud Applications, Full-Stack Web Development, HTML and CSS, Cloud Computing, Jupyter, Generative AI, Interviewing Skills
- Status: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
University of Virginia
Skills you'll gain: Growth Strategies, Business Strategy, Strategic Thinking, Plan Execution, Business Strategies, Mergers & Acquisitions, Competitive Analysis, Organizational Strategy, Strategic Planning, Business Ethics, Peer Review, Data-Driven Decision-Making, Business Development, Business Planning, Corporate Strategy, Strategic Leadership, Strategic Decision-Making, Governance, Business Research, Project Management
In summary, here are 10 of our most popular developing a security strategy for edge networks courses
- Google Cybersecurity: Google
- Deep Learning: DeepLearning.AI
- Computer Networks and Network Security: IBM
- Machine Learning: DeepLearning.AI
- Security in Google Cloud: Google Cloud
- IBM Cybersecurity Analyst: IBM
- Connect and Protect: Networks and Network Security: Google
- Strategic Management and Innovation: Copenhagen Business School
- IT Fundamentals for Cybersecurity: IBM
- IBM Full Stack Software Developer: IBM