Filter by
The language used throughout the course, in both instruction and assessments.
Results for "ec2 security"
Skills you'll gain: Cyber Security Policies, Cyber Security Assessment, Risk Management Framework, Security Management, Cyber Risk, Cybersecurity, Cyber Governance, Cyber Security Strategy, Security Awareness, Technical Communication
Skills you'll gain: IT Security Architecture, IT Infrastructure, Network Security, OSI Models, Systems Administration, Microsoft Windows, Information Systems Security, Package and Software Management, Technical Support, Computer Networking, Network Troubleshooting, Cloud Infrastructure, Operating Systems, TCP/IP, Lightweight Directory Access Protocols, Disaster Recovery, Cybersecurity, Desktop Support, Software Installation, Help Desk Support
Kennesaw State University
Skills you'll gain: Security Management, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, Cyber Governance, Business Risk Management, Law, Regulation, and Compliance, Information Management, Cybersecurity, Business Ethics, Performance Measurement, Compliance Management, Governance, Cyber Risk, Organizational Strategy
University of Colorado System
Skills you'll gain: Database Design, Software Design, Usability Testing, User Interface and User Experience (UI/UX) Design, Databases, Software Architecture, Software Design Patterns, Systems Design, Application Security, Design Strategies, Operating Systems
Microsoft
Skills you'll gain: Microsoft Azure, NoSQL, Database Administration, Database Systems, Cloud Storage, Data Storage, Cloud Services, Data Security, Data Management
Microsoft
Skills you'll gain: Microsoft Azure, Cloud Security, Data Security, Network Security, Cloud Applications, Authorization (Computing), Role-Based Access Control (RBAC), Application Security, Microsoft SQL Servers, Cloud Development, Azure Active Directory, Data Loss Prevention, Firewall, Relational Databases, Key Management, Identity and Access Management, Threat Detection, Encryption, Virtual Machines
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cybersecurity, Threat Management, Security Controls, Threat Detection, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Cyber Security Assessment, Data Security, Network Security, Enterprise Security, Information Assurance, Incident Response, Data Integrity
Fortinet, Inc.
Skills you'll gain: Firewall, Network Security, Virtual Private Networks (VPN), Network Administration, Intrusion Detection and Prevention, Network Infrastructure, Enterprise Security, Network Architecture, Security Controls, System Configuration, Performance Tuning, Hardware Architecture
Packt
Skills you'll gain: Application Security, Identity and Access Management, Security Engineering, IT Security Architecture, Security Management, Network Security, Security Testing, Security Controls, Secure Coding, Cyber Security Assessment, Security Strategy, User Provisioning, Information Systems Security, Cybersecurity, User Accounts, General Networking, Authentications, Data Security, Computer Security Incident Management, Information Assurance
University of London
Skills you'll gain: Social Justice, Community Development, Conflict Management, Social and Human Services, Cultural Responsiveness, International Relations, Diversity Awareness, Advocacy, Social Sciences, Policty Analysis, Research, and Development, Safety and Security, Law, Regulation, and Compliance, Storytelling
Johns Hopkins University
Skills you'll gain: Transportation Operations, Land Management, Growth Strategies, Community Development, Civil Engineering, Geographic Information Systems, Environmental Issue, Policy Analysis, Feasibility Studies, Stakeholder Engagement
Skills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Cyber Threat Hunting, Penetration Testing, Anomaly Detection, Scripting, Command-Line Interface, Python Programming, Data Access, System Monitoring, User Accounts, Scripting Languages, System Programming, Automation
In summary, here are 10 of our most popular ec2 security courses
- Cybersecurity Policy Foundations:Â Infosec
- Google IT Support (Deutsch):Â Google
- The Business of Cybersecurity Capstone:Â Kennesaw State University
- Software Design as an Abstraction:Â University of Colorado System
- Microsoft Azure Cosmos DB:Â Microsoft
- Secure your Cloud Data:Â Microsoft
- Cybersecurity Best Practices:Â Coursera Instructor Network
- Enterprise Firewall Administrator:Â Fortinet, Inc.
- CISSP Crash Course:Â Packt
- Internal Displacement, Conflict and Protection:Â University of London