Filter by
The language used throughout the course, in both instruction and assessments.
Results for "identificación de las actividades que se realizan para definir requisitos de software"
Skills you'll gain: Threat Modeling, Cloud Security, Internet Of Things, Infrastructure Security, Vulnerability Management, Information Systems Security, Incident Response, Identity and Access Management, Threat Management, Penetration Testing, Vulnerability Scanning, Network Security, Cloud Computing, Cloud Computing Architecture, Threat Detection, Embedded Software, Authentications, Authorization (Computing)
Skills you'll gain: Cloud Development, Microsoft Azure, Virtual Machines, Cloud Computing, Infrastructure As A Service (IaaS), Application Deployment, Angular, Web Applications, Linux, Node.JS, Javascript, MongoDB
Kennesaw State University
Skills you'll gain: Target Market, Strategic Marketing, Marketing, Product Strategy, Business Strategy, Market Analysis, Marketing Psychology, Marketing Strategies, Revenue Management, Brand Strategy, Competitive Analysis, Consumer Behaviour, Product Promotion
Google Cloud
Skills you'll gain: Load Balancing, Cloud Computing, Network Performance Management, Performance Tuning, Proxy Servers, Cloud Security, TCP/IP, Distributed Denial-Of-Service (DDoS) Attacks
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Mobile Security, Cybersecurity, Threat Modeling, Penetration Testing, Cyber Threat Intelligence, Open Web Application Security Project (OWASP), Malware Protection, Threat Detection, Network Security, MITRE ATT&CK Framework, Cyber Attacks, Intrusion Detection and Prevention, Information Systems Security, Wireless Networks, Cryptography, Risk Management Framework, Encryption
Skills you'll gain: Remote Access Systems, Threat Detection, Information Technology Operations, Wireless Networks, Network Security, Mobile Security, Information Systems Security, Virtual Private Networks (VPN), General Networking, Cybersecurity, Network Administration, Network Troubleshooting, Document Management, Data Security, Malware Protection, Augmented and Virtual Reality (AR/VR), Emerging Technologies, Change Control, Encryption, Multi-Factor Authentication
Johns Hopkins University
Skills you'll gain: Data Visualization, Data Visualization Software, Data Presentation, Graphic and Visual Design, Data Storytelling, Design Elements And Principles, Graphing, Exploratory Data Analysis, Scatter Plots, Color Theory
- Status: Free
Coursera Instructor Network
Skills you'll gain: Product Flow Diagram, Process Flow Diagrams, New Product Development, Go To Market Strategy, Product Development, Product Improvement, Product Design, Process Mapping, Product Planning, Customer Analysis, User Research, User Feedback, Continuous Improvement Process
Skills you'll gain: Responsive Web Design, Cascading Style Sheets (CSS), Web Applications, Web Design and Development, Javascript, Front-End Web Development, Application Programming Interface (API), Web Development, Real Time Data
Johns Hopkins University
Skills you'll gain: Malware Protection, Cybersecurity, Internet Of Things, Network Monitoring, TCP/IP, Network Security, Network Analysis, Border Gateway Protocol, Threat Detection, Network Routing, Network Protocols, Vulnerability Assessments, Docker (Software)
West Virginia University
Skills you'll gain: Unified Modeling Language, Verification And Validation, Threat Modeling, Security Management, Secure Coding, Scope Management, Application Security, Financial Statements, Proposal Development, Cash Flows, Object Oriented Design, Requirements Analysis, Software Design, Security Requirements Analysis, Incident Response, Database Design, Configuration Management, Business Process Management, Object Oriented Programming (OOP), Mobile Development
- Status: Free
Coursera Project Network
Skills you'll gain: Cloud-Native Computing, Unstructured Data, Go (Programming Language), Web Servers, MySQL, Web Scraping, Kubernetes, Web Applications, Database Application, Linux
In summary, here are 10 of our most popular identificación de las actividades que se realizan para definir requisitos de software courses
- Securing the IoT Landscape: From Inception to Architecture: LearnQuest
- Launch a Website with Azure Virtual Machines: Microsoft
- Segmenting the Market with Jagdish Sheth: Kennesaw State University
- Networking in Google Cloud: Load Balancing: Google Cloud
- Certified Ethical Hacker (CEH) v.12: Packt
- Advanced Networking, Security, and IT Operations: Packt
- Foundations of Data Visualization: Johns Hopkins University
- How to Build a Product Flow Diagram: Coursera Instructor Network
- API Basics 4: Build a Personal Dashboard (Promise Rejection): Scrimba
- Cybersecurity Fundamentals: Johns Hopkins University