Filter by
The language used throughout the course, in both instruction and assessments.
Results for "application layer security"
Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Infrastructure as Code (IaC), Amazon CloudWatch, AWS CloudFormation, Software Development Life Cycle, CI/CD, Amazon Web Services, Professional Networking, IT Automation, Cloud Computing, Amazon S3, Extract, Transform, Load, DevOps, Data-Driven Decision-Making, Software Architecture, Cloud Computing Architecture, Amazon DynamoDB, Cloud Infrastructure, Web Applications, Leadership Development
ISC2
Skills you'll gain: Authentications, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Data Security, Security Controls, User Provisioning, Information Systems Security, Multi-Factor Authentication, Network Architecture
University at Buffalo
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Network Protocols, FinTech, Virtual Environment, Data Integrity, Emerging Technologies, Data Security, Data Validation, User Accounts
- Status: Free
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Mathematical Software, Algorithms
Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, NIST 800-53, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR), Business Ethics
Skills you'll gain: Serverless Computing, Digital Transformation, Cloud Services, Data Ethics, Cloud Infrastructure, Google Cloud Platform, Application Programming Interface (API), Business Transformation, Applied Machine Learning, Hybrid Cloud Computing, Image Analysis, Infrastructure As A Service (IaaS), Cloud Computing, Public Cloud, Containerization, Cloud Computing Architecture, Multi-Cloud, Machine Learning, Software As A Service, Computer Vision
Skills you'll gain: Identity and Access Management, IT Security Architecture, Authentications, Continuous Monitoring, Business Continuity, Security Controls, Secure Coding, Security Testing, Cryptography, Disaster Recovery, Vulnerability Assessments, Cyber Security Assessment, Application Security, Incident Management, Security Engineering, Data Security, Network Security, User Provisioning, OSI Models, Data Loss Prevention
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Cyber Governance, Risk Mitigation, Vendor Management, Risk Modeling, Threat Management, Vulnerability Assessments, Security Management, Cyber Risk, Compliance Management, Cyber Security Policies, Cybersecurity, Security Awareness, Cyber Security Strategy
Skills you'll gain: Bash (Scripting Language), Linux Commands, Command-Line Interface, Operating Systems, SQL, Linux, Cybersecurity, Linux Administration, Databases, Computer Hardware, Relational Databases, File Systems, User Accounts
Illinois Tech
Skills you'll gain: Cloud Security, Identity and Access Management, AWS Identity and Access Management (IAM), Incident Response, Cloud Computing, Cloud Computing Architecture, Data Security, Application Security, Network Security, Encryption, Role-Based Access Control (RBAC), Amazon Web Services, Key Management, Infrastructure Security, Security Controls, Firewall, Continuous Monitoring, Multi-Factor Authentication
Google Cloud
Skills you'll gain: Cloud Management, Serverless Computing, Google Cloud Platform, Digital Transformation, Data Governance, Cloud Services, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Cloud Infrastructure, Artificial Intelligence and Machine Learning (AI/ML), Data Strategy, Application Programming Interface (API), Real Time Data, Business Transformation, Artificial Intelligence, Data Management, Hybrid Cloud Computing, Data Warehousing, Cloud Computing, Data Security
University of Colorado Boulder
Skills you'll gain: Data Import/Export, Microsoft Excel, Regression Analysis, Data Validation, Data Visualization, Depreciation, Spreadsheet Software, Data Management, Excel Macros, Data Cleansing, Excel Formulas, Financial Analysis, Capital Budgeting, Cash Flows, Predictive Modeling, Financial Modeling, Data Analysis Expressions (DAX), Mathematical Modeling, Complex Problem Solving, Automation
In summary, here are 10 of our most popular application layer security courses
- AWS Cloud Technology Consultant: Amazon Web Services
- Access Control: ISC2
- Blockchain Basics: University at Buffalo
- Cryptography I: Stanford University
- Cybersecurity Compliance Framework, Standards & Regulations: IBM
- Digital Transformation Using AI/ML with Google Cloud: Google Cloud
- CISSP Certified Information Systems Security Professional: Packt
- Introduction to Cybersecurity & Risk Management: University of California, Irvine
- Tools of the Trade: Linux and SQL: Google
- Cloud Computing Security - Master's: Illinois Tech