Filter by
The language used throughout the course, in both instruction and assessments.
Results for "ec2 security"
Microsoft
Skills you'll gain: Virtual Private Networks (VPN), Cybersecurity, Multi-Factor Authentication, Authentications, Information Systems Security, Network Security, Technical Support and Services, Information Privacy, Servers, Cloud Computing, Cloud Security, Network Administration, Encryption, Identity and Access Management, Mac OS
Microsoft
Skills you'll gain: Database Management, C# (Programming Language), Microsoft SQL Servers, SQL, ASP.NET, Load Balancing, Relational Databases, Role-Based Access Control (RBAC), Scalability, Object Oriented Programming (OOP), Databases, Authentications, Debugging, Secure Coding, .NET Framework, Performance Tuning, Server Side, Back-End Web Development, Program Development, Algorithms
Amazon Web Services
Skills you'll gain: Amazon Web Services, Data Migration, Cloud Management, Cloud Infrastructure, Cloud Security, Cloud Computing, Infrastructure Architecture, Cloud Storage, Managed Services
University of London
Skills you'll gain: Computer Science, Computer Systems, Web Applications, Computer Networking, Computational Thinking, Debugging, Usability, Cybersecurity, Software Architecture, Network Protocols, Databases
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Cyber Operations, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Threat Management
- Status: Free
Yale University
Skills you'll gain: Land Management, Environment, Natural Resource Management, Environmental Issue, Environment and Resource Management, Water Resources, Environmental Policy, Socioeconomics, Finance, Governance
- Status: Free
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Security Testing, Network Security, Network Monitoring, Operating Systems
Akamai Technologies, Inc.
Skills you'll gain: Routing Protocols, OSI Models, TCP/IP, General Networking, Network Protocols, Network Troubleshooting, Computer Networking, Networking Hardware, Network Security, Network Infrastructure, Network Model, Virtual Private Networks (VPN), Wireless Networks, Network Routers, Dynamic Host Configuration Protocol (DHCP), Intrusion Detection and Prevention, Network Analysis, Security Controls
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Cybersecurity, Dependency Analysis, Docker (Software), Git (Version Control System)
LearnQuest
Skills you'll gain: Network Troubleshooting, Hardware Troubleshooting, Virtualization, Security Awareness, Desktop Support, Help Desk Support, Malware Protection, Cloud Computing, Computer Hardware, General Networking, Technical Support, System Support, Networking Hardware, Computer Security Incident Management, Operating Systems
University of Colorado Boulder
Skills you'll gain: OSI Models, Network Security, TCP/IP, Network Architecture, Network Protocols, General Networking, Network Routing, Network Routers, Computer Networking, Routing Protocols, Public Key Infrastructure, Network Model, Cryptography
Skills you'll gain: Cyber Attacks, Cybersecurity, Threat Management, Business Continuity, Threat Detection, Endpoint Security, Disaster Recovery, Cyber Security Policies, Incident Response, Vulnerability Assessments, Vulnerability Management, Network Security, Governance Risk Management and Compliance, Security Controls, Cloud Security, Risk Management
In summary, here are 10 of our most popular ec2 security courses
- Cybersecurity and Privacy:Â Microsoft
- Microsoft Back-End Developer:Â Microsoft
- Migrating to the AWS Cloud:Â Amazon Web Services
- How Computers Work:Â University of London
- In the Trenches: Security Operations Center :Â EC-Council
- Tropical Forest Landscapes 101: Conservation & Restoration:Â Yale University
- Vulnerability Scanning with Nmap: Network Scanning:Â Coursera Project Network
- Networking Fundamentals:Â Akamai Technologies, Inc.
- Exploiting and Securing Vulnerabilities in Java Applications:Â University of California, Davis
- CompTIA Exam Prep:Â LearnQuest