Filter by
The language used throughout the course, in both instruction and assessments.
Results for "ec2 security"
The University of Melbourne
Skills you'll gain: Financial Analysis, Financial Statement Analysis, Financial Statements, Corporate Finance, Financial Accounting, Accounting, Financial Systems, Financial Modeling, Investments, Capital Markets, Market Liquidity, Financial Management, Balance Sheet, Derivatives, Financial Market, Income Statement, Business Valuation, International Finance, Mergers & Acquisitions, Capital Budgeting
Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Cloud Computing, Linux, Risk Management Framework, Network Monitoring, Security Management, Operating Systems, Cyber Risk, Cloud Services, Cloud Platforms, General Networking, Windows PowerShell, Cyber Governance, Unix Commands, Cyber Security Strategy
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Data Security, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
University of California, Irvine
Skills you'll gain: Swift Programming, Objective-C (Programming Language), iOS Development, Core Data (Software), Apple iOS, Apple Xcode, Model View Controller, JSON, User Interface (UI) Design, UI Components, User Interface and User Experience (UI/UX) Design, OAuth, Responsive Web Design, Prototyping, Human Computer Interaction, UI/UX Strategy, Usability Testing, Authentications, Data Mapping, Mobile Development
ConsenSys Academy
Skills you'll gain: Blockchain, Cryptography, Interoperability, Encryption, FinTech, Emerging Technologies, Distributed Computing, Digital Assets, Business Analysis, Systems Architecture, Transaction Processing
University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Information Systems Security, Cybersecurity, Encryption, Virtual Private Networks (VPN), Cyber Attacks, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting
University of Michigan
Skills you'll gain: PHP (Scripting Language), MySQL, Database Application, Database Development, Object Oriented Design, Object Oriented Programming (OOP), Application Development, Back-End Web Development, Secure Coding, Authentications, Web Applications, SQL, Databases, Network Protocols, Application Security
- Status: Free
Northeastern University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Ethics, Law, Regulation, and Compliance, Data Security, Journalism, Emerging Technologies, Digital Communications, Data Collection, Internet Of Things, Machine Learning, Artificial Intelligence
Skills you'll gain: Kubernetes, CI/CD, Google Cloud Platform, Continuous Integration, DevOps, Continuous Delivery, Cloud Applications, Application Performance Management, Cloud Storage, Cloud Security, Role-Based Access Control (RBAC), Identity and Access Management, Authorization (Computing), Authentications
Skills you'll gain: Cloud Computing Architecture, Cloud Computing, Cloud Security, Identity and Access Management, Cloud Infrastructure, Incident Response, Hardening, IT Security Architecture, Emerging Technologies, Network Security, Security Controls, Capacity Management
Skills you'll gain: Incident Response, Business Continuity, Disaster Recovery, Cybersecurity, Security Management, Computer Security Incident Management, Crisis Management, Information Assurance
In summary, here are 10 of our most popular ec2 security courses
- Essentials of Corporate Finance:Â The University of Melbourne
- Cybersecurity Foundations:Â Infosec
- Secure Coding Practices:Â University of California, Davis
- Cyber Attack Countermeasures:Â New York University
- iOS Development for Creative Entrepreneurs:Â University of California, Irvine
- Blockchain: Foundations and Use Cases:Â ConsenSys Academy
- Security and Privacy in TOR Network:Â University of Colorado System
- Building Database Applications in PHP:Â University of Michigan
- Data Privacy Fundamentals:Â Northeastern University
- Architecting with Google Kubernetes Engine: Production:Â Google Cloud