Filter by
The language used throughout the course, in both instruction and assessments.
Results for "ec2 security"
Skills you'll gain: Security Information and Event Management (SIEM), System Configuration, Microsoft Azure, System Monitoring, Security Management, Threat Detection, Automation, Cloud Solutions, Incident Management, Query Languages
Skills you'll gain: Continuous Monitoring, Incident Response, NIST 800-53, Risk Management Framework, Computer Security Incident Management, Business Continuity, Security Management, Disaster Recovery, Security Controls, Authorization (Computing), Risk Management, System Monitoring, Security Testing, Threat Management, Security Strategy, Cyber Security Policies, Cybersecurity, Cyber Risk, Configuration Management, Information Systems Security
Coursera Project Network
Skills you'll gain: Dynamic Host Configuration Protocol (DHCP), Virtual Local Area Network (VLAN), Network Administration, System Configuration, TCP/IP, Computer Networking, General Networking, Virtual Environment, Network Switches, Network Routers, Networking Hardware, Network Engineering, Simulations, Configuration Management, Verification And Validation
Skills you'll gain: Customer Engagement, Data Ethics, Generative AI, Data Governance, Customer Support, Regulation and Legal Compliance, Client Support, Customer Service, Customer Relationship Management (CRM) Software, Workflow Management, Microsoft 365, Customer Success Management, Compliance Management, Sales Enablement, Marketing Automation, Ethical Standards And Conduct, ChatGPT, Artificial Intelligence, Productivity Software, Business Process Automation
Skills you'll gain: Linux Commands, Linux, Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Command-Line Interface, Security Testing, Scripting, Vulnerability Assessments, Scripting Languages, Intrusion Detection and Prevention, Cyber Security Assessment, General Networking, Python Programming, Network Security, Cybersecurity, Application Security, Firewall, Web Applications, Cyber Operations
Queen Mary University of London
Skills you'll gain: Cloud Services, Cloud Computing, Cloud Computing Architecture, Contract Negotiation, Cloud Security, Vendor Contracts, Cyber Risk, Infrastructure As A Service (IaaS), Contract Review, Law, Regulation, and Compliance, Contract Management, Regulation and Legal Compliance, Service Level Agreement, Data Security, Data Governance
Skills you'll gain: Application Security, Security Testing, Software Testing, Cyber Security Assessment, Cryptography, Penetration Testing, Encryption, Authentications, Identity and Access Management, Business Logic, Test Case, Vulnerability Assessments, Web Servers, Data Validation, Network Protocols
Infosec
Skills you'll gain: Secure Coding, Computer Programming Tools, Application Security, System Programming, C++ (Programming Language), C (Programming Language), Software Development Tools, Code Review, Debugging, Interoperability, Unix, Embedded Systems, Cryptography, Programming Principles, Security Engineering, Vulnerability Assessments, Operating Systems, Data Security, Linux
University of Colorado Boulder
Skills you'll gain: Data Security, Cybersecurity, Cyber Attacks, Data Ethics, Authentications, Data Encryption Standard, Cryptography, Cyber Security Policies, Authorization (Computing), Security Controls, Data Integrity, Information Privacy, Security Awareness
Coursera Project Network
Skills you'll gain: TCP/IP, Network Protocols, Network Monitoring, OSI Models, Network Security, Web Servers, Network Analysis
- Status: Free
Coursera Instructor Network
Skills you'll gain: Personally Identifiable Information, Governance Risk Management and Compliance, Information Privacy, Data Governance, Data Security, Cybersecurity, Data Management, Cyber Attacks, Data Loss Prevention, Data Ethics, Cyber Governance, Cyber Risk, Encryption
- Status: Free
Coursera Instructor Network
Skills you'll gain: Information Privacy, General Data Protection Regulation (GDPR), Personally Identifiable Information, Data Security, Data Governance, Data Ethics, Law, Regulation, and Compliance, Data Loss Prevention, Data Management, Security Controls, Regulatory Compliance, Compliance Management, Compliance Training, Data Sharing, Security Strategy, Regulatory Requirements, Data Processing, Risk Management, Employee Training, Risk Analysis
In summary, here are 10 of our most popular ec2 security courses
- Configure SIEM Security Operation using Microsoft Sentinel:Â Microsoft
- NIST Cybersecurity and Risk Management Frameworks:Â Packt
- Configure and Test Basic Network Connectivity:Â Coursera Project Network
- Microsoft Copilot: Your Everyday AI Companion:Â Microsoft
- The Complete Ethical Hacking Bootcamp: Beginner To Advanced:Â Packt
- Cloud Computing Law: Transactions:Â Queen Mary University of London
- Software Security Testing:Â Packt
- Writing Secure Code in C++:Â Infosec
- Cybersecurity for Data Science:Â University of Colorado Boulder
- Wireshark for Beginners: TCP IP Protocol Fundamentals:Â Coursera Project Network