Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "iam security design"
The Hong Kong University of Science and Technology
Skills you'll gain: Acceptance Testing, Software Development Methodologies, Configuration Management, Debugging, Software Development Life Cycle, Software Testing, Software Engineering, Unified Modeling Language, System Testing, Verification And Validation, Unit Testing, System Design and Implementation, Agile Software Development, Secure Coding, Test Case, Requirements Analysis, Waterfall Methodology
Skills you'll gain: Splunk, Security Information and Event Management (SIEM), Data Modeling, Role-Based Access Control (RBAC), System Monitoring, Dashboard, Incident Response, Threat Detection, User Accounts, Data Transformation, Authorization (Computing), Cybersecurity, Machine Learning, Systems Administration, Performance Tuning, Data Visualization, Event Monitoring, Data Analysis, Statistical Analysis, Pivot Tables And Charts
Skills you'll gain: Cyber Security Policies, Cyber Security Assessment, Risk Management Framework, Security Management, Cyber Risk, Cybersecurity, Cyber Governance, Cyber Security Strategy, Security Awareness, Technical Communication
Kennesaw State University
Skills you'll gain: Security Management, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, Cyber Governance, Business Risk Management, Law, Regulation, and Compliance, Information Management, Cybersecurity, Business Ethics, Performance Measurement, Compliance Management, Governance, Cyber Risk, Organizational Strategy
- Status: Free
École Polytechnique Fédérale de Lausanne
Skills you'll gain: Geographic Information Systems, GIS Software, Spatial Data Analysis, Spatial Analysis, NoSQL, Data Modeling, Database Design, Databases, SQL, Data Storage, Data Capture, Data Management, Data Manipulation
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Cyber Threat Hunting, Intrusion Detection and Prevention, Threat Management, Incident Response, Event Monitoring, Computer Security Incident Management, Network Analysis, Cybersecurity, Anomaly Detection, Network Security, Network Monitoring, Network Protocols, SQL
Google Cloud
Skills you'll gain: Google Workspace, Calendar Management, Setting Appointments, Organizational Skills, Productivity Software, Collaboration, Scheduling, Event Management, Data Sharing
University of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Information Assurance, Data Security, Public Key Cryptography Standards (PKCS)
Rice University
Skills you'll gain: Computational Thinking, Algorithms, Data Structures, Big Data, Python Programming, Data Analysis, Machine Learning Algorithms, Unsupervised Learning, Computer Science, Analysis
University of Colorado System
Skills you'll gain: Data Warehousing, Dashboard, Star Schema, Data Visualization Software, Data Mart, MicroStrategy, Business Intelligence, Data Integration, Extract, Transform, Load, Data Modeling, PostgreSQL, Oracle Databases, SQL
- Status: Free
Johns Hopkins University
Skills you'll gain: Intercultural Competence, Cultural Sensitivity, Cultural Diversity, Stress Management, Preventative Care, Injury Prevention, Health And Safety Standards, Safety and Security, Risk Management, Ethical Standards And Conduct, Adaptability, Infectious Diseases, Planning
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Risk Mitigation, Risk Modeling, Vulnerability Assessments, Security Controls
In summary, here are 10 of our most popular iam security design courses
- Software Engineering: Implementation and Testing: The Hong Kong University of Science and Technology
- SIEM Splunk Hands-On Guide: EDUCBA
- Cybersecurity Policy Foundations: Infosec
- The Business of Cybersecurity Capstone: Kennesaw State University
- Geographical Information Systems - Part 1: École Polytechnique Fédérale de Lausanne
- Threat Analysis: Cisco Learning and Certifications
- Google Calendar: Google Cloud
- Cryptographic Hash and Integrity Protection: University of Colorado System
- Algorithmic Thinking (Part 2): Rice University
- Design and Build a Data Warehouse for Business Intelligence Implementation: University of Colorado System