Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security and access management in teradata"
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Amazon S3, Authorization (Computing), Role-Based Access Control (RBAC), Authentications, Single Sign-On (SSO), Cloud Storage, User Accounts, Data Security, Multi-Factor Authentication, Encryption
- Status: Free
University of London
Skills you'll gain: People Management, Conflict Management, Team Motivation, Leadership, Human Resources Management and Planning, Employee Performance Management, Performance Management, People Development, Leadership and Management, Performance Appraisal, Interviewing Skills, Decision Making, Compensation Management, Recruitment
Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Amazon DynamoDB, Amazon Web Services, Serverless Computing, Cloud Computing, Amazon S3, Scalability, Amazon Elastic Compute Cloud, Event-Driven Programming, Solution Architecture, Cloud Computing Architecture, Cloud Solutions, Data Migration, Identity and Access Management, Cloud Storage, API Gateway, Cloud Management, Cloud Infrastructure, Cloud Security
Macquarie University
Skills you'll gain: Microsoft Excel, Data Visualization, Spreadsheet Software, Excel Formulas, Data Management, Microsoft 365, Data Entry, Productivity Software
SkillUp EdTech
Skills you'll gain: Cryptographic Protocols, Blockchain, Business Continuity, Cryptography, Disaster Recovery, Digital Assets, Vulnerability Assessments, Enterprise Security, Data Security, Law, Regulation, and Compliance, Application Frameworks, Cybersecurity, Information Systems Security, Network Security, Emerging Technologies, Distributed Computing, Transaction Processing
Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Data Security, Application Security, Vulnerability Management, Threat Detection, Malware Protection, Infrastructure Security, Continuous Monitoring, IT Automation, Identity and Access Management
- Status: [object Object]
Skills you'll gain: Media Planning, Search Engine Marketing, Email Marketing, Data Storytelling, Social Media Strategy, Search Engine Optimization, Social Media, Social Media Marketing, Content Creation, Order Fulfillment, A/B Testing, Target Audience, Digital Marketing, E-Commerce, Loyalty Programs, Social Media Management, Customer Retention, Persona Development, Performance Measurement, Marketing Automation
Skills you'll gain: Stakeholder Engagement, Agile Software Development, Project Management Life Cycle, Resource Management, Risk Management, Peer Review, Earned Value Management, Stakeholder Management, Agile Methodology, Project Risk Management, Team Motivation, Kanban Principles, Project Schedules, Project Management Institute (PMI) Methodology, Negotiation, Project Management, IT Management, Interviewing Skills, Professional Networking, Project Coordination
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Cyber Operations, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Threat Management
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Linux Commands, IBM Cognos Analytics, Data Pipelines, Apache Kafka, Bash (Scripting Language), Shell Script, Data Visualization, Dashboard, File Management, Star Schema, Unix Shell, IBM DB2, Business Intelligence, Databases, Stored Procedure, Relational Databases
- Status: Free
Universiteit Leiden
Skills you'll gain: Risk Management, Business Risk Management, Operational Risk, Risk Analysis, Safety and Security, Environmental Issue, Public Safety and National Security, Cyber Security Strategy
Copenhagen Business School
Skills you'll gain: Strategic Thinking, Business Strategy, Business Strategies, Strategic Decision-Making, Strategic Leadership, Business Transformation, Technology Strategies, Competitive Analysis, Global Marketing, Consumer Behaviour
In summary, here are 10 of our most popular security and access management in teradata courses
- AWS: Identity and Access Management: Whizlabs
- The Manager's Toolkit: A Practical Guide to Managing People at Work: University of London
- AWS Fundamentals: Amazon Web Services
- Excel Skills for Business: Essentials: Macquarie University
- Business Implementation and Security: SkillUp EdTech
- Mitigating Security Vulnerabilities on Google Cloud: Google Cloud
- Google Digital Marketing & E-commerce: Google
- IBM Project Manager: IBM
- In the Trenches: Security Operations Center : EC-Council
- BI Foundations with SQL, ETL and Data Warehousing: IBM