Filter by
The language used throughout the course, in both instruction and assessments.
Results for "ec2 security"
University of Alberta
Skills you'll gain: Sprint Planning, Project Risk Management, User Story, Backlogs, Agile Methodology, User Requirements Documents, Functional Requirement, Agile Project Management, Requirements Analysis
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Cyber Operations, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Threat Management
- Status: [object Object]
Microsoft
Skills you'll gain: Microsoft Power Platform, Excel Formulas, Process Flow Diagrams, Business Process Modeling, User Story, Business Requirements, Stakeholder Management, Data Modeling, Microsoft Excel, Microsoft Visio, Software Development Life Cycle, Requirements Analysis, Requirements Elicitation, Quality Management, Pivot Tables And Charts, Power BI, Project Management Life Cycle, Microsoft Power Automate/Flow, Business Analysis, Project Management
University of Minnesota
Skills you'll gain: Software Development Methodologies, Agile Methodology, Software Engineering, Software Development Life Cycle, Requirements Analysis, Application Deployment, Agile Software Development, Systems Development, Software Architecture, Verification And Validation, Software Development, Process Driven Development, Waterfall Methodology, Software Testing, Scrum (Software Development), Release Management, Development Testing, Maintainability
Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cybersecurity, Network Security, Cyber Security Strategy, System Monitoring, Cyber Operations, Threat Management, Continuous Monitoring, Cyber Threat Intelligence, Incident Response, Cyber Attacks, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Python Programming, Data Access, Intrusion Detection and Prevention
Illinois Tech
Skills you'll gain: Firewall, Microsoft Windows, Operating Systems, Linux, Linux Administration, System Configuration, Network Security, Authorization (Computing), System Monitoring, System Software, Windows Servers, Systems Administration, File Management, Data Security, Identity and Access Management
Skills you'll gain: Cost Management, Quality Management, Backlogs, Project Closure, Project Planning, Sprint Retrospectives, Project Scoping, Team Leadership, Project Management Life Cycle, Agile Project Management, Communication Planning, Continuous Improvement Process, Process Improvement, Project Management Software, Project Management, Change Control, Project Controls, Agile Methodology, Requirements Analysis, Change Management
University at Buffalo
Skills you'll gain: Digital Transformation, Manufacturing Processes, Manufacturing Operations, Industrial Engineering, Business Transformation, Product Design, Digital Design, Data-Driven Decision-Making, Process Improvement and Optimization, Market Dynamics, Safety and Security, Workforce Development
- Status: Free
University of Pittsburgh
Skills you'll gain: Triage, Mitigation, Business Continuity Planning, Emergency Response, Safety and Security, Public Safety and National Security, Resilience, Emergency Medicine, First Aid, Risk Management, Cultural Diversity
Skills you'll gain: Oracle Cloud, Identity and Access Management, Oracle Databases, Cloud Infrastructure, Cloud Computing Architecture, Cloud Services, Cloud Security, Cloud Computing, Infrastructure As A Service (IaaS), Computing Platforms, Data Storage, Cloud Storage, Application Security, Data Security
University of Michigan
Skills you'll gain: Data Ethics, Information Privacy, Personally Identifiable Information, Data Security, Data Governance, Ethical Standards And Conduct, Big Data, Law, Regulation, and Compliance, Data Analysis, Social Sciences, Data-Driven Decision-Making, Diversity Awareness
Skills you'll gain: NIST 800-53, Risk Management Framework, Cyber Risk, Federal Information Security Management Act, Cybersecurity, Risk Management, Security Management, Cyber Governance, Cyber Security Strategy, Operational Risk, Governance Risk Management and Compliance, Security Controls, Continuous Monitoring, Infrastructure Security, Cyber Security Assessment, Enterprise Risk Management (ERM), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
In summary, here are 10 of our most popular ec2 security courses
- Agile Planning for Software Products:Â University of Alberta
- In the Trenches: Security Operations Center :Â EC-Council
- Microsoft Business Analyst:Â Microsoft
- Software Development Processes and Methodologies:Â University of Minnesota
- Python for Cybersecurity:Â Infosec
- OS Security:Â Illinois Tech
- Google Project Management (PT):Â Google
- Digital Manufacturing & Design:Â University at Buffalo
- Disaster Preparedness:Â University of Pittsburgh
- Oracle Cloud Infrastructure Foundations:Â Oracle