Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security hardening"
Skills you'll gain: Blockchain, Cryptography, Application Security, Network Security, Security Engineering, Secure Coding, Information Systems Security, Encryption, Cybersecurity, Threat Modeling, Vulnerability Assessments, Transaction Processing, Data Integrity
Infosec
Skills you'll gain: Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Application Security, Security Testing, Authorization (Computing), Authentications, Data Validation, Encryption, Security Controls, Data Security, Vulnerability Scanning, Role-Based Access Control (RBAC), Verification And Validation, Intrusion Detection and Prevention, Security Awareness, Web Servers, Continuous Monitoring, User Accounts, Web Applications, Configuration Management
Skills you'll gain: Amazon Web Services, Containerization, AWS CloudFormation, Infrastructure as Code (IaC), Amazon CloudWatch, CI/CD, Kubernetes, Docker (Software), Cloud-Native Computing, Cloud Infrastructure, Application Deployment, Serverless Computing, Software Development Life Cycle, Puppet (Configuration Management Tool), Configuration Management, Disaster Recovery, Continuous Deployment, Amazon Elastic Compute Cloud, Firewall, Devops Tools
SkillUp EdTech
Skills you'll gain: Data Security, Data Governance, Data Architecture, Data Quality, Personally Identifiable Information, Incident Response, Security Controls, Threat Management, Threat Detection, Risk Management, Cybersecurity, Compliance Management, Encryption, Data Integrity, Regulatory Compliance, Role-Based Access Control (RBAC)
EIT Digital
Skills you'll gain: Cybersecurity, Threat Modeling, Information Systems Security, Security Management, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Security Policies, Threat Management, Cyber Risk, Threat Detection, Cyber Security Assessment, Network Security, Application Security, Risk Management, Security Controls, Security Awareness, Data Security, Information Privacy, Vulnerability Assessments, Business Economics
Accenture
Skills you'll gain: Microsoft Excel, Data Security, Data Analysis, Data-Driven Decision-Making, Programming Principles, Spreadsheet Software, Analytics, Emerging Technologies, Data Collection, Computer Security Awareness Training, Digital Communications, Computer Programming, Web Development, Information Technology, Business Technologies, Technology Solutions, Javascript, Python Programming, Blockchain, Cloud Computing
Kennesaw State University
Skills you'll gain: Cost Benefit Analysis, Risk Management Framework, Risk Management, Risk Analysis, ISO/IEC 27001, Enterprise Risk Management (ERM), NIST 800-53, Business Risk Management, Risk Mitigation, Governance Risk Management and Compliance, Cybersecurity, Technical Standard, Continuous Monitoring, Security Controls
Kennesaw State University
Skills you'll gain: Risk Management, Security Management, Risk Management Framework, Threat Management, Operational Risk, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Risk Analysis, Risk Modeling, Compliance Management, Vulnerability Assessments, Threat Modeling, Continuous Improvement Process
The University of Edinburgh
Skills you'll gain: Data Ethics, Law, Regulation, and Compliance, Data Security, Information Privacy, Data Governance, Big Data, Ethical Standards And Conduct, Artificial Intelligence, Machine Learning, Social Sciences, Diversity Awareness, Innovation
Microsoft
Skills you'll gain: Generative AI, Technical Communication, Anomaly Detection, Natural Language Processing, Data Ethics, Data Storytelling, Data Quality, Data-Driven Decision-Making, Data Pipelines, Data Cleansing, Data Synthesis, Data Analysis, Data Visualization Software, Big Data, Data Validation, Strategic Communication, Information Privacy, Artificial Intelligence, Artificial Neural Networks, Data Science
Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Systems Architecture, Zero Trust Network Access, Risk Management Framework, Security Requirements Analysis, Application Security, Computer Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Solution Architecture, Security Strategy, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Zero Trust Network Access, Application Deployment, Network Protocols, Identity and Access Management, Software Installation, Infrastructure Architecture, Solution Architecture, Linux
In summary, here are 10 of our most popular security hardening courses
- Blockchain Security - Intermediate Practices :Â LearnQuest
- Secure Coding in Laravel:Â Infosec
- Exam Prep: AWS Certified DevOps Engineer - Professional:Â Whizlabs
- Data Privacy, Security, Governance, Risk and Compliance:Â SkillUp EdTech
- Becoming a Cybersecurity Consultant:Â EIT Digital
- Understanding Technology and Data:Â Accenture
- Dominant Risk Management Standards and Frameworks:Â Kennesaw State University
- A General Approach to Risk Management:Â Kennesaw State University
- Data Ethics, AI and Responsible Innovation:Â The University of Edinburgh
- Microsoft Copilot for Data Science:Â Microsoft