Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security & accessibility best practices"
University of Colorado System
Skills you'll gain: Infrastructure Security, Cyber Risk, Cyber Security Policies, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Risk Management Framework, Technology Roadmaps, Network Infrastructure, Transportation Operations, Infrastructure Architecture
DeepLearning.AI
Skills you'll gain: Artificial Intelligence and Machine Learning (AI/ML), Classification And Regression Tree (CART), Machine Learning Algorithms, Machine Learning, Applied Machine Learning, Data Ethics, Decision Tree Learning, Tensorflow, Supervised Learning, Deep Learning, Random Forest Algorithm, Artificial Neural Networks, Algorithms, Regression Analysis, Performance Tuning
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Containerization, Encryption
University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, System Monitoring, System Implementation, Systems Administration, Virtualization, Network Security, Linux Commands
Skills you'll gain: Computer Security Incident Management, Incident Management, Incident Response, Security Management, Threat Management, Event Monitoring, Security Information and Event Management (SIEM), Enterprise Security, Cyber Operations, Information Technology Operations, Automation
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Server Side, Vulnerability Assessments
Palo Alto Networks
Skills you'll gain: Cloud Security, DevSecOps, Cloud-Native Computing, Cloud Platforms, Cloud Computing, Infrastructure Security, DevOps, Software As A Service, Public Cloud, Network Security, CI/CD, Docker (Software), Containerization, Hybrid Cloud Computing, Serverless Computing, Vulnerability Scanning, Data Centers, Virtualization
University of California, Irvine
Skills you'll gain: Vendor Management, Security Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Security Controls, Human Factors (Security), Asset Protection, Due Diligence
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Cybersecurity, Configuration Management, Computing Platforms, Hardware Troubleshooting, Computer Hardware, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Peripheral Devices
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, OSI Models, Network Security, Firewall, Threat Detection, Network Administration, Network Protocols, Cyber Attacks, General Networking, Security Management, TCP/IP, Virtual Local Area Network (VLAN), Software-Defined Networking
Skills you'll gain: Site Reliability Engineering, Cloud Infrastructure, Kubernetes, Application Performance Management, Google Cloud Platform, System Monitoring, Infrastructure As A Service (IaaS), Application Deployment, Identity and Access Management, Cloud Applications, CI/CD, Containerization, Cloud Computing, Cloud Security, Cloud Management, Service Level Agreement, Continuous Delivery, Safety Culture, Network Monitoring, Continuous Integration
In summary, here are 10 of our most popular security & accessibility best practices courses
- Cybersecurity Policy for Aviation and Internet Infrastructures:Â University of Colorado System
- Advanced Learning Algorithms:Â DeepLearning.AI
- Systems and Application Security:Â ISC2
- Computer Security and Systems Management:Â University of Colorado System
- SOAR for Enterprise Security:Â Codio
- Introduction to Cyber Security:Â New York University
- Software Security for Web Applications:Â Codio
- Palo Alto Networks Cloud Security Fundamentals:Â Palo Alto Networks
- Personnel & Third-Party Security:Â University of California, Irvine
- IBM and ISC2 Cybersecurity Specialist:Â IBM