Filter by
The language used throughout the course, in both instruction and assessments.
Results for "infrastructure security"
University of London
Skills you'll gain: Computer Science, Computer Systems, Web Applications, Computer Networking, Computational Thinking, Debugging, Usability, Cybersecurity, Software Architecture, Network Protocols, Databases
University of Illinois Urbana-Champaign
Skills you'll gain: Big Data, Apache Spark, Apache Hadoop, Distributed Computing, Data Storage, Data Processing, NoSQL, Apache Kafka, Real Time Data, Cloud Computing, Databases, Analytics, Deep Learning, Scalability, Machine Learning Algorithms, Graph Theory, Machine Learning, Algorithms
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Cyber Operations, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Threat Management
- Status: Free
Yale University
Skills you'll gain: Land Management, Environment, Natural Resource Management, Environmental Issue, Environment and Resource Management, Water Resources, Environmental Policy, Socioeconomics, Finance, Governance
- Status: Free
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Security Testing, Network Security, Network Monitoring, Operating Systems
University of Michigan
Skills you'll gain: Manufacturing Operations, Digital Transformation, Technology Strategies, Business Modeling, Production Process, Product Lifecycle Management, Asset Management, Internet Of Things, Business Metrics, Simulation and Simulation Software, Real Time Data, Risk Analysis, Systems Integration, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML)
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Cybersecurity, Dependency Analysis, Docker (Software), Git (Version Control System)
Skills you'll gain: Cyber Attacks, Cybersecurity, Threat Management, Business Continuity, Threat Detection, Endpoint Security, Disaster Recovery, Cyber Security Policies, Incident Response, Vulnerability Assessments, Vulnerability Management, Network Security, Governance Risk Management and Compliance, Security Controls, Cloud Security, Risk Management
Infosec
Skills you'll gain: Criminal Investigation and Forensics, Cybersecurity, TCP/IP, Network Protocols, Data Security, Digital Communications, Network Security, Data Ethics, General Networking, Record Keeping, Data Storage, Data Integrity, File Management, File Systems, Ethical Standards And Conduct, Encryption, Data Validation, Technical Writing, Linux Commands
Board Infinity
Skills you'll gain: HR Tech, People Analytics, Human Resources, Data Ethics, Generative AI, Talent Acquisition, Employee Engagement, Recruitment, Human Resource Strategy, Employee Training, Workforce Planning, Artificial Intelligence, Information Privacy, Diversity and Inclusion
Association of International Certified Professional Accountants
Skills you'll gain: Blockchain, Key Management, Digital Assets, Asset Management, Cryptography, Cybersecurity, Security Awareness, FinTech, Emerging Technologies, Security Controls, Securities (Finance), Multi-Factor Authentication, Financial Market, Encryption, Financial Regulations, Distributed Computing, Accounting, Accounting and Finance Software, Network Security, Technology Solutions
Google Cloud
Skills you'll gain: Infrastructure as Code (IaC), Terraform, Google Cloud Platform, Cloud Infrastructure, Cloud Storage, DevOps
In summary, here are 10 of our most popular infrastructure security courses
- How Computers Work:Â University of London
- Cloud Computing Applications, Part 2: Big Data and Applications in the Cloud:Â University of Illinois Urbana-Champaign
- In the Trenches: Security Operations Center :Â EC-Council
- Tropical Forest Landscapes 101: Conservation & Restoration:Â Yale University
- Vulnerability Scanning with Nmap: Network Scanning:Â Coursera Project Network
- Digital Twins:Â University of Michigan
- Exploiting and Securing Vulnerabilities in Java Applications:Â University of California, Davis
- Office of the CISO Institute: Cybersecurity Essentials:Â Google
- Digital Forensics Concepts:Â Infosec
- Generative AI in HR - Impact and Application of Gen AI:Â Board Infinity