Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure configurations"
- Status: New
Skills you'll gain: Spring Framework, Cloud-Native Computing, Software Development Life Cycle, Hibernate (Java), Docker (Software), Git (Version Control System), GitHub, HTML and CSS, Object Oriented Programming (OOP), Spring Boot, Object-Relational Mapping, Development Environment, Hypertext Markup Language (HTML), Object Oriented Design, Java Programming, Generative AI, Interviewing Skills, CI/CD, Java, Professional Networking
- Status: New
Microsoft
Skills you'll gain: CI/CD, Cascading Style Sheets (CSS), GitHub, Database Management, C# (Programming Language), Microsoft SQL Servers, HTML and CSS, SQL, ASP.NET, Load Balancing, Continuous Integration, Version Control, Relational Databases, Git (Version Control System), Scalability, Full-Stack Web Development, Back-End Web Development, Programming Principles, Graph Theory, User Interface and User Experience (UI/UX) Design
- Status: New
Skills you'll gain: NoSQL, Data Warehousing, SQL, Apache Hadoop, Extract, Transform, Load, Apache Airflow, Data Security, Linux Commands, Data Migration, Database Design, Data Governance, MySQL, Apache Spark, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Cloud Storage
Skills you'll gain: CI/CD, Istio, Open Web Application Security Project (OWASP), Continuous Integration, Agile Software Development, Kubernetes, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Jenkins, Code Coverage, Cloud-Native Computing, OpenShift, Cloud Applications, Containerization, Agile Methodology, DevOps, Secure Coding, Grafana, System Monitoring
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Firewall, Cyber Attacks, Penetration Testing, Network Security, Information Assurance, Risk Management Framework, Cryptography, Security Engineering, Intrusion Detection and Prevention, Threat Modeling, Application Security, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Software Design Patterns, Threat Detection
University at Buffalo
Skills you'll gain: Blockchain, Test Driven Development (TDD), Cryptography, Application Development, Transaction Processing, Emerging Technologies, Application Frameworks, Web Development Tools, Software Architecture, Network Protocols, Web Applications, Program Development, Distributed Computing, Application Programming Interface (API), Cloud Platforms, Microsoft Azure, Secure Coding, Software Development, Development Environment, FinTech
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Regulatory Compliance, General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Compliance Auditing, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Regulatory Requirements, Regulation and Legal Compliance, Communication Planning, Risk Management, Internal Communications, Procedure Development, Data Security, Continuous Monitoring, Business Ethics, Governance, Internal Controls
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Databases, Software Architecture, Secure Coding, Software Design Patterns, Systems Design, Software Engineering, Software Development Tools, Software Development Life Cycle, Technical Design, Security Engineering
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Information and Event Management (SIEM), Security Awareness
University of Minnesota
Skills you'll gain: User Story, Agile Software Development, Software Design Patterns, Design Thinking, Software Development Methodologies, Agile Methodology, Agile Project Management, Software Engineering, Kanban Principles, Software Development Life Cycle, Application Security, Scrum (Software Development), Object Oriented Design, Software Architecture, User Experience Design, Software Quality (SQA/SQC), Requirements Analysis, Application Deployment, Lean Methodologies, Lean Manufacturing
Skills you'll gain: Network Security, Incident Response, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Configuration Management, Cybersecurity, Security Awareness, Security Management, Computer Security Incident Management, Cyber Attacks, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)
Skills you'll gain: Threat Management, Cybersecurity, Cyber Risk, Computer Security Incident Management, Risk Management Framework, Risk Management, Incident Response, Security Information and Event Management (SIEM), Security Controls, Security Strategy, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), MITRE ATT&CK Framework, Auditing, Compliance Auditing
In summary, here are 10 of our most popular secure configurations courses
- IBM Java Developer: IBM
- Microsoft Full-Stack Developer: Microsoft
- IBM Data Architecture: IBM
- IBM Applied DevOps Engineering: IBM
- Fundamentals of Computer Network Security: University of Colorado System
- Blockchain: University at Buffalo
- Regulatory Compliance: University of Pennsylvania
- Secure Software Design: University of Colorado System
- Security Analyst Fundamentals: IBM
- Software Development Lifecycle: University of Minnesota