Filter by
The language used throughout the course, in both instruction and assessments.
Results for "ec2 security"
Johns Hopkins University
Skills you'll gain: Clinical Data Management, Data Quality, Quality Assurance, Clinical Trials, Data Cleansing, Data Management, Data Integrity, Microsoft Excel, Data Compilation, Data Collection, Data Sharing, Data Security, Patient Treatment, Continuous Monitoring
University of Illinois Urbana-Champaign
Skills you'll gain: Big Data, Apache Spark, Apache Hadoop, Distributed Computing, Data Storage, Data Processing, NoSQL, Apache Kafka, Real Time Data, Cloud Computing, Databases, Analytics, Deep Learning, Scalability, Machine Learning Algorithms, Graph Theory, Machine Learning, Algorithms
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, OSI Models, Network Security, Firewall, Threat Detection, Network Administration, Network Protocols, Cyber Attacks, General Networking, Security Management, TCP/IP, Virtual Local Area Network (VLAN), Software-Defined Networking
Emory University
Skills you'll gain: Epidemiology, Emergency Response, Sanitation, Social and Human Services, Health Systems, Water Resources, Infectious Diseases, Public Safety and National Security, Health Administration, Mental Health, Food Safety and Sanitation, Data Collection
Universidad de los Andes
Skills you'll gain: Cryptography, Security Requirements Analysis, Human Factors (Security), Encryption, Data Security, Security Management, Personally Identifiable Information, Threat Management, ISO/IEC 27001, Information Assurance, Cyber Attacks, Cybersecurity, Security Awareness, Law, Regulation, and Compliance
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications
Johns Hopkins University
Skills you'll gain: Sanitation, Crisis Intervention, Water Resources, Emergency Response, Public Safety and National Security, Health Systems, Environmental Resource Management, Health Care, Infectious Diseases, Food Safety and Sanitation, International Relations, Health Assessment
Google Cloud
Skills you'll gain: Cloud Infrastructure, Cloud Development, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Applications, Identity and Access Management, Infrastructure As A Service (IaaS), Google Cloud Platform, Kubernetes, Cloud Security, Cloud Services, Cloud Storage, Application Development, Containerization, Encryption, Virtual Machines, OAuth, Security Controls, Cloud Computing, Data Loss Prevention, Continuous Monitoring
Skills you'll gain: Azure Active Directory, Active Directory, Microsoft Azure, Multi-Factor Authentication, Authentications, User Accounts, Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, Cloud Security, Single Sign-On (SSO), Hybrid Cloud Computing, Self Service Technologies
- Status: Free
Infosec
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Detection, Threat Modeling, MITRE ATT&CK Framework, Endpoint Detection and Response, Cybersecurity, Malware Protection, Security Information and Event Management (SIEM), Anomaly Detection, Generative AI, Network Analysis
Skills you'll gain: Incident Response, Business Continuity Planning, Continuous Monitoring, Disaster Recovery, Threat Management, Risk Analysis, Risk Mitigation, Vulnerability Scanning, Security Information and Event Management (SIEM), Vulnerability Assessments, Investigation, Penetration Testing
University of Minnesota
Skills you'll gain: Test Automation, Regression Testing, Software Testing, Software Development Tools, Unit Testing, Software Engineering Tools, Software Technical Review, JUnit, Development Testing, System Testing, Code Coverage, Security Testing, Verification And Validation, Test Case, Test Data, Debugging, Automation, Application Security, Vulnerability Scanning, Java Programming
In summary, here are 10 of our most popular ec2 security courses
- Clinical Trials Data Management and Quality Assurance:Â Johns Hopkins University
- Cloud Computing Applications, Part 2: Big Data and Applications in the Cloud:Â University of Illinois Urbana-Champaign
- Network and Communications Security:Â ISC2
- Health in Complex Humanitarian Emergencies:Â Emory University
- Principios y Regulaciones de Seguridad de la Información: Universidad de los Andes
- Asymmetric Cryptography and Key Management:Â University of Colorado System
- Public Health in Humanitarian Crises 1:Â Johns Hopkins University
- Security in Google Cloud en Français: Google Cloud
- Secure Access with Azure Active Directory:Â Microsoft
- Cyber Threat Hunting:Â Infosec