Filter by
The language used throughout the course, in both instruction and assessments.
Results for "ec2 security"
Universidad de los Andes
Skills you'll gain: Cryptography, Security Requirements Analysis, Human Factors (Security), Encryption, Data Security, Security Management, Personally Identifiable Information, Threat Management, ISO/IEC 27001, Information Assurance, Cyber Attacks, Cybersecurity, Security Awareness, Law, Regulation, and Compliance
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Kubernetes, Virtual Machines, Microservices, Infrastructure As A Service (IaaS), Cloud Computing, Cloud Computing Architecture, Cloud Applications, Application Deployment, Data Storage Technologies, Cloud Security, Data Storage, Cloud Services, Cloud Management, Cloud Storage, Network Architecture, Cloud Solutions, Terraform
- Status: Free
Campus BBVA
Skills you'll gain: Incident Response, Computer Security Incident Management, Cybersecurity, Cyber Attacks, Security Management, Security Information and Event Management (SIEM), Information Systems Security, Data Security, Incident Management, Cyber Threat Intelligence, Application Security, Computer Security Awareness Training, Intrusion Detection and Prevention, Information Technology Operations, Threat Management, Security Controls, Threat Detection, Malware Protection, Loss Prevention, Continuous Monitoring
University of Colorado System
Skills you'll gain: Software Design, Software Development Life Cycle, Application Security, Technical Design, Security Engineering, Software Architecture, Software Development Methodologies, Conceptual Design, Waterfall Methodology, Requirements Analysis, Agile Methodology
- Status: Free
Technion - Israel Institute of Technology
Skills you'll gain: Semiconductors, Innovation, Environmental Monitoring, Electronic Systems, Engineering, Manufacturing Processes, Scientific Methods, Research Reports, Health Care
University of Colorado System
Skills you'll gain: Requirements Analysis, User Requirements Documents, Requirements Elicitation, Agile Methodology, Functional Requirement, Software Documentation, System Requirements, Software Development Life Cycle, Agile Software Development, Waterfall Methodology, Technical Communication
University of Minnesota
Skills you'll gain: Cloud Security, Data Security, Cloud Services, Cloud Storage, Personally Identifiable Information, General Data Protection Regulation (GDPR), Information Privacy, Data Governance, Data Integrity, Security Controls, Relational Databases, Encryption, SQL
Skills you'll gain: Database Management, Databases, Relational Databases, Data Security, User Accounts, SQL, Stored Procedure, Database Design, Application Security, Threat Modeling, Vulnerability Scanning, Cybersecurity, NoSQL, Data Integrity, Role-Based Access Control (RBAC), Encryption
University of Michigan
Skills you'll gain: C (Programming Language), C++ (Programming Language), Object Oriented Programming (OOP), Data Structures, Programming Principles, Secure Coding, Algorithms, Computer Programming, Software Design, Application Security, System Programming, Python Programming, Maintainability, Java, Performance Tuning, Numerical Analysis, Unix, Computer Science, Computer Programming Tools, Debugging
Skills you'll gain: Microsoft Power Platform, Microsoft Power Automate/Flow, Power BI, Dashboard, Data Visualization, Data Integration, Business Intelligence, Business Process Automation, Productivity Software, Application Development, Microsoft 365, Platform As A Service (PaaS), Performance Analysis, Workflow Management, Data Security, Data Store, Cloud Applications, Business Process, Microsoft Teams, Data Analysis Software
Johns Hopkins University
Skills you'll gain: Clinical Data Management, Data Quality, Quality Assurance, Clinical Trials, Data Cleansing, Data Management, Data Integrity, Microsoft Excel, Data Compilation, Data Collection, Data Sharing, Data Security, Patient Treatment, Continuous Monitoring
Skills you'll gain: Hardware Troubleshooting, Network Security, General Networking, Network Administration, Infrastructure Security, Network Troubleshooting, Technical Support, Mobile Security, Desktop Support, System Support, Computer Hardware, Technical Services, Information Technology, Operating Systems, Mac OS, Virtualization and Virtual Machines, Test Planning, Microsoft Windows, Unix, Network Protocols
In summary, here are 10 of our most popular ec2 security courses
- Principios y Regulaciones de Seguridad de la Información: Universidad de los Andes
- Architecting with Google Compute Engine 日本語版: Google Cloud
- Cybersecurity for Tech Professionals: Campus BBVA
- Software Design as an Element of the Software Development Lifecycle: University of Colorado System
- Nanotechnology and Nanosensors, Part 2: Technion - Israel Institute of Technology
- Requirements Gathering for Secure Software Development: University of Colorado System
- Cloud Data Security: University of Minnesota
- Database Essentials and Vulnerabilities: IBM
- C Programming for Everybody: University of Michigan
- Microsoft Power Platform Fundamentals PL-900 Exam Prep: Microsoft