Filter by
The language used throughout the course, in both instruction and assessments.
Results for "iam security design"
Infosec
Skills you'll gain: Risk Management Framework, Federal Information Security Management Act, NIST 800-53, Risk Management, Cyber Risk, Security Management, Operational Risk, Governance Risk Management and Compliance, Continuous Monitoring, Enterprise Risk Management (ERM), Regulatory Requirements, Law, Regulation, and Compliance, Cyber Security Policies, Risk Mitigation, Risk Analysis, Security Controls, Authorization (Computing), Project Management Life Cycle, Cyber Security Assessment
Skills you'll gain: Project Management, Milestones (Project Management), Data Storytelling, Requirements Analysis, Project Scoping, Stakeholder Management, Project Planning, Project Documentation, Quality Management, Interviewing Skills, Communication
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
University of Colorado System
Skills you'll gain: Linux Administration, Linux, Linux Servers, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Server Administration, Authorization (Computing), Network Administration, Information Systems Security, Authentications
University of Michigan
Skills you'll gain: Database Design, SQL, MySQL, Relational Databases, Database Management, Databases, Data Modeling, Data Integrity, Development Environment, Software Installation
University of Michigan
Skills you'll gain: User Experience, User Experience Design, Prototyping, Wireframing, User Centered Design, Interaction Design, Design Thinking, Design, Usability Testing, Storyboarding, Creativity
Epic Games
Skills you'll gain: Software Design Documents, Ideation, Technical Documentation, Conceptual Design, Design Thinking, Design, Prototyping, Visual Design, Creativity
- Status: Free
University of London
Skills you'll gain: Research, Peer Review, Research Reports, Research Methodologies, Writing, Research Design, Timelines, Data Collection, Ethical Standards And Conduct
Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Data Security, Application Security, Vulnerability Management, Threat Detection, Malware Protection, Infrastructure Security, Continuous Monitoring, IT Automation, Identity and Access Management
University of Michigan
Skills you'll gain: UI/UX Research, User Experience Design, User Experience, User Research, User Centered Design, Interaction Design, Prototyping, Usability Testing, Usability, Design Thinking, Human Computer Interaction, Human Factors
University of Alberta
Skills you'll gain: Requirements Analysis, Agile Software Development, Agile Methodology, Kanban Principles, Requirements Elicitation, Sprint Retrospectives, Requirements Management, Functional Requirement, Business Requirements, Sprint Planning, Software Development Methodologies, Project Risk Management, Software Development Life Cycle, Scrum (Software Development), Software Technical Review, Software Development, Product Management, Agile Project Management, User Story, Backlogs
Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Infrastructure as Code (IaC), Command-Line Interface, Amazon CloudWatch, AWS CloudFormation, Root Cause Analysis, Amazon DynamoDB, Network Troubleshooting, Amazon Web Services, Customer Relationship Management, Software Architecture, IT Automation, Linux Commands, Cloud Computing, Linux, Amazon S3, Scalability, Scripting, Cloud Infrastructure, Web Applications
In summary, here are 10 of our most popular iam security design courses
- NIST DoD RMF: Infosec
- Capstone: Applying Project Management in the Real World: Google
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Linux Server Management and Security: University of Colorado System
- Introduction to Structured Query Language (SQL): University of Michigan
- UX Design: From Concept to Prototype: University of Michigan
- Introduction to Game Design: Epic Games
- Understanding Research Methods: University of London
- Mitigating Security Vulnerabilities on Google Cloud: Google Cloud
- Introduction to User Experience Principles and Processes: University of Michigan