Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security hardening"
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Cybersecurity, Threat Modeling, Malware Protection, Penetration Testing, Threat Detection, Cyber Attacks, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Awareness, Lightweight Directory Access Protocols, Network Protocols
Skills you'll gain: Data Management, Artificial Intelligence and Machine Learning (AI/ML), Infrastructure Architecture, Data Infrastructure, MLOps (Machine Learning Operations), Application Deployment, Data Cleansing, Artificial Intelligence, Continuous Deployment, Data Security, Application Frameworks, PyTorch (Machine Learning Library), Machine Learning, Tensorflow, Applied Machine Learning, Data Pipelines, Scikit Learn (Machine Learning Library), Scalability, Feature Engineering, Version Control
Institute for the Future
Skills you'll gain: Forecasting, Systems Thinking, Strategic Thinking, Brainstorming, Game Theory, Creative Thinking, Collaboration, Interviewing Skills, Innovation, Ethical Standards And Conduct, Empathy, Business Ethics, Communication
Skills you'll gain: Technical Design, User Feedback, Project Design, Technical Consulting, Solution Design, Solution Architecture, SAP Applications, Technical Communication, Requirements Analysis, Business Analysis, System Implementation, Product Roadmaps, Business Requirements, Gap Analysis, Customer Engagement
Packt
Skills you'll gain: Disaster Recovery, Incident Management, Business Continuity Planning, Information Technology Operations, Threat Management, Cybersecurity, Security Information and Event Management (SIEM), Security Controls, Patch Management, Threat Detection, Intrusion Detection and Prevention, Infrastructure Security, Vulnerability Management, Safety and Security, Configuration Management, Change Control
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Malware Protection, Vulnerability Assessments, Operating Systems, OS Process Management
- Status: Free
The State University of New York
Skills you'll gain: Lifelong Learning, Growth Mindedness, Willingness To Learn, Personal Development, Critical Thinking, Emerging Technologies, Professional Development, Data Ethics, Ethical Standards And Conduct, Safety and Security, Computer Security Awareness Training, Technology Solutions, Digital Transformation, Digital Communications, Web Content Accessibility Guidelines, Collaboration, Communication
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Command-Line Interface, Firewall, System Configuration, Security Management, Network Security, Virtual Machines, Virtualization
Tableau Learning Partner
Skills you'll gain: Requirements Elicitation, Business Analysis, Business Metrics, Key Performance Indicators (KPIs), Requirements Analysis, Business Requirements, Process Analysis, Stakeholder Management, Business Process, Business Process Modeling, Tableau Software, Data Visualization
- Status: Free
Skills you'll gain: Information Technology, Cloud Computing, Databases, Desktop Support, Technical Support and Services, Cybersecurity, Computer Security Awareness Training, Software Installation, Test Tools, Computer Networking, Computer Hardware
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Risk Mitigation, Risk Modeling, Vulnerability Assessments, Security Controls
- Status: Free
Skills you'll gain: Embedded Software, Unified Modeling Language, Systems Development Life Cycle, Embedded Systems, Internet Of Things, Software Development Life Cycle, Systems Architecture, Software Architecture, System Design and Implementation, Technical Design, Systems Engineering, Software Systems, System Requirements, Computer Architecture, Requirements Analysis
In summary, here are 10 of our most popular security hardening courses
- System Hacking, Malware Threats, and Network Attacks:Â Packt
- Foundations of AI and Machine Learning:Â Microsoft
- Collaborative Foresight: How to Game the Future:Â Institute for the Future
- Designing an SAP Solution:Â SAP
- Security Operations:Â Packt
- Technical Deep Dive with Incident Response Tools:Â Infosec
- Exploring Emerging Technologies for Lifelong Learning and Success:Â The State University of New York
- Check Point Jump Start: Maestro Hyperscale Network Security:Â Check Point Software Technologies Ltd.
- Business Analysis Process:Â Tableau Learning Partner
- Practice Exam for CompTIA ITF+ Certification:Â IBM