Filter by
The language used throughout the course, in both instruction and assessments.
Results for "ec2 security"
University of Colorado Boulder
Skills you'll gain: Data Ethics, Data Visualization, Data Visualization Software, Interactive Data Visualization, Visualization (Computer Graphics), Data Security, Data Presentation, Technical Communication, Cybersecurity, Cyber Attacks, Statistical Reporting, Data Storytelling, User Centered Design, Authentications, Data Science, Data Encryption Standard, Ethical Standards And Conduct, User Experience Design, Cryptography, Data Integrity
University of Minnesota
Skills you'll gain: Gherkin (Scripting Language), Software Testing, Testability, Test Case, Behavior-Driven Development, Code Coverage, Acceptance Testing, Unit Testing, Functional Testing, Test Automation, Test Driven Development (TDD), Requirements Analysis, Functional Requirement
University of Colorado Boulder
Skills you'll gain: Internet Of Things, Cloud Computing Architecture, Amazon Web Services, Application Security, Application Programming Interface (API), Microservices, Embedded Systems, Network Protocols, Cloud Technologies, Cybersecurity, Cloud Computing, Serial Peripheral Interface, Wireless Networks, Wide Area Networks
Cisco Learning and Certifications
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cyber Threat Intelligence, Threat Detection, General Networking, Network Security, Cybersecurity, Cyber Security Policies, Infrastructure Security, Computer Networking, Technical Services, Technical Support and Services
Skills you'll gain: Technical Support, Hardware Troubleshooting, Cloud Computing, Desktop Support, Cloud Services, Cybersecurity, Help Desk Support, End User Training and Support, Network Troubleshooting, Network Administration, Computer Hardware, Data Storage, Issue Tracking, Operating Systems
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Market Liquidity, Analysis, Financial Policy, Economics, International Finance, Financial Systems, Financial Market, Financial Regulation, Market Dynamics, Supply And Demand, Banking
Skills you'll gain: Security Information and Event Management (SIEM), System Configuration, Microsoft Azure, System Monitoring, Security Management, Threat Detection, Automation, Cloud Solutions, Incident Management, Query Languages
Akamai Technologies, Inc.
Skills you'll gain: Linux, Linux Administration, Linux Servers, File Systems, Linux Commands, Operating Systems, User Accounts, OS Process Management, File Management, Unix Shell, Unix Commands, System Configuration, Authorization (Computing), Command-Line Interface, Open Source Technology, Systems Administration, Virtualization, Virtual Machines
ISC2
Skills you'll gain: Authentications, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Security Controls, IT Security Architecture, User Provisioning, Multi-Factor Authentication, User Accounts, Data Security, Application Security, Information Systems Security, Network Security, Information Assurance, Data Integrity, Network Architecture
Skills you'll gain: Data Management, Artificial Intelligence and Machine Learning (AI/ML), Infrastructure Architecture, Data Infrastructure, MLOps (Machine Learning Operations), Application Deployment, Data Cleansing, Artificial Intelligence, Continuous Deployment, Data Security, Application Frameworks, PyTorch (Machine Learning Library), Machine Learning, Tensorflow, Applied Machine Learning, Data Pipelines, Scikit Learn (Machine Learning Library), Scalability, Feature Engineering, Version Control
Institute for the Future
Skills you'll gain: Forecasting, Systems Thinking, Strategic Thinking, Brainstorming, Game Theory, Creative Thinking, Collaboration, Interviewing Skills, Innovation, Ethical Standards And Conduct, Empathy, Business Ethics, Communication
Skills you'll gain: Technical Design, User Feedback, Project Design, Technical Consulting, Solution Design, Solution Architecture, SAP Applications, Technical Communication, Requirements Analysis, Business Analysis, System Implementation, Product Roadmaps, Business Requirements, Gap Analysis, Customer Engagement
In summary, here are 10 of our most popular ec2 security courses
- Vital Skills for Data Science:Â University of Colorado Boulder
- Black-box and White-box Testing:Â University of Minnesota
- M2M & IoT Interface Design & Protocols for Embedded Systems:Â University of Colorado Boulder
- Threat Response:Â Cisco Learning and Certifications
- Technical Support (IT) Case Studies and Capstone:Â IBM
- Monetary Policy in the Asia Pacific:Â The Hong Kong University of Science and Technology
- Configure SIEM Security Operation using Microsoft Sentinel:Â Microsoft
- Operating Systems Fundamentals:Â Akamai Technologies, Inc.
- Access Controls :Â ISC2
- Foundations of AI and Machine Learning:Â Microsoft