Filter by
The language used throughout the course, in both instruction and assessments.
Results for "application layer security"
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Contingency Planning, Risk Management, Cyber Security Strategy, Security Management, Cybersecurity, Governance, Information Technology, Staff Management, Proposal Development, Organizational Structure, Presentations
University of Colorado System
Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Controls, Threat Detection, Linux Administration, Linux
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, ISO/IEC 27001, Computer Security Awareness Training, Cyber Risk, Information Assurance
University of Colorado System
Skills you'll gain: Cryptography, Cybersecurity, Encryption, Public Key Infrastructure, Data Integrity
Skills you'll gain: Secure Coding, Penetration Testing, Application Security, Payment Systems, Continuous Monitoring, Blockchain, Incident Response, Code Review, Vulnerability Assessments, Data Security, Development Testing, Authorization (Computing), Data Validation
Palo Alto Networks
Skills you'll gain: Network Security, General Networking, TCP/IP, Cryptography, Endpoint Security, Firewall, Cybersecurity, Encryption, Network Infrastructure, Computer Networking, Public Key Infrastructure, Zero Trust Network Access, Network Protocols
Packt
Skills you'll gain: Data Security, Data Loss Prevention, Data Management, Security Management, Security Controls, Personally Identifiable Information, Cloud Security, Information Management, Data Governance, Security Requirements Analysis
Skills you'll gain: Continuous Monitoring, Business Continuity, Security Management, ISO/IEC 27001, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
University of Colorado System
Skills you'll gain: Infrastructure Security, Cyber Risk, Cyber Security Policies, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Risk Management Framework, Technology Roadmaps, Network Infrastructure, Transportation Operations, Infrastructure Architecture
Skills you'll gain: Incident Response, IT Security Architecture, Identity and Access Management, Continuous Monitoring, Network Security, Security Awareness, Information Systems Security, Security Information and Event Management (SIEM), Application Security, Disaster Recovery, Security Controls, Cloud Security, Cyber Security Strategy, Threat Detection, Cyber Governance, Risk Management Framework, Authentications
Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Secure Coding, Application Security, Identity and Access Management, Information Systems Security Assessment Framework (ISSAF), Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Systems Architecture, Security Strategy, Security Engineering, Zero Trust Network Access, Security Awareness, Security Information and Event Management (SIEM), Risk Management Framework, Disaster Recovery, Security Requirements Analysis
In summary, here are 10 of our most popular application layer security courses
- Road to the CISO – Culminating Project Course: Kennesaw State University
- Secure Networked System with Firewall and IDS: University of Colorado System
- Cyber Attack Countermeasures: New York University
- Security Management and Governance: Royal Holloway, University of London
- Classical Cryptosystems and Core Concepts: University of Colorado System
- Security and Auditing in Ethereum: EDUCBA
- Palo Alto Networks Network Security Fundamentals: Palo Alto Networks
- Asset Security: Packt
- Security and Risk Management: Packt
- Cybersecurity Policy for Aviation and Internet Infrastructures: University of Colorado System