Filter by
The language used throughout the course, in both instruction and assessments.
Results for "vulnerability assessment"
Google Cloud
Skills you'll gain: Identity and Access Management, Kubernetes, Cloud Security, Google Cloud Platform, Cloud Storage, Encryption, Application Security, Data Encryption Standard, Cloud API, Authorization (Computing), Data Security, Continuous Monitoring, Virtual Machines, Authentications, Vulnerability Scanning
Johns Hopkins University
Skills you'll gain: Data Quality, Health Assessment, Data Sharing, Data-Driven Decision-Making, Health Care, Data Analysis, Data Management, Data Collection, Data Storytelling, Data Presentation, Policy Analysis, Policy Development, Technical Communication, Program Evaluation, Diversity Equity and Inclusion Initiatives
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Programming Interface (API), Threat Modeling, Web Applications, Vulnerability Assessments, Application Security, Security Testing, Web Development, Security Strategy, Restful API, Security Controls, Authentications, Authorization (Computing), Server Side, Encryption, SQL
Microsoft
Skills you'll gain: DevOps, Agile Methodology, Application Deployment, Docker (Software), Project Management, Continuous Integration, Technical Communication, Needs Assessment, Prometheus (Software), Business Requirements, Python Programming, Natural Language Processing, Collaboration, Communication, Professional Networking, Interviewing Skills
University of Minnesota
Skills you'll gain: Project Planning, Project Design, Business Planning, Predictive Analytics, Advanced Analytics, Sprint Planning, Needs Assessment, Staff Management, Process Mapping, Business Analysis, Analytics, Operational Analysis, Solution Design, Process Analysis, Workforce Planning, Investment Management, Business Analytics, Portfolio Management, Capacity Planning, Decision Support Systems
Skills you'll gain: Cryptography, ASP.NET, Encryption, Open Web Application Security Project (OWASP), .NET Framework, Secure Coding, Data Security, Authentications, Application Security, Vulnerability Assessments, Security Engineering, Threat Modeling, Data Access, Security Controls, Identity and Access Management, C# (Programming Language), Web Applications, Development Environment, Cross Platform Development
Microsoft
Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), Authentications, Authorization (Computing), Application Security, Data Validation, Web Applications, Security Testing, Web Development, Vulnerability Assessments, Data Security, Microsoft Development Tools
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Unix, Application Security, Vulnerability Assessments, Cybersecurity, Unix Commands, System Programming, Linux, Debugging, Command-Line Interface, Windows PowerShell, Computer Architecture, Authentications
Johns Hopkins University
Skills you'll gain: Epidemiology, Survey Creation, Data Collection, Health Assessment, Program Evaluation, Health Systems, Health Information Management and Medical Records, Data Quality, Medical Science and Research, Research Design, Diversity Awareness, Continuous Monitoring
Skills you'll gain: Disaster Recovery, Business Continuity Planning, Business Continuity, Risk Analysis, Contingency Planning, Risk Management, Key Performance Indicators (KPIs), Incident Management, Test Planning, IT Infrastructure, Cloud Services, Business Process, Communication Strategies
Edureka
Skills you'll gain: Amazon Web Services, AWS CloudFormation, Amazon Elastic Compute Cloud, Virtual Machines, Cloud Infrastructure, Cloud Computing, Cloud Computing Architecture, Software Architecture, Application Deployment, Cloud Security, Virtualization, Amazon S3, AWS Identity and Access Management (IAM), Scalability, Disaster Recovery
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Kubernetes, OAuth, Security Controls, Role-Based Access Control (RBAC), Authentications, Application Security, Cloud Storage, Authorization (Computing), Data Security, Encryption, Vulnerability Scanning, Key Management
In summary, here are 10 of our most popular vulnerability assessment courses
- Security Best Practices in Google Cloud 日本語版: Google Cloud
- Datos para Avanzar en la Salud Poblacional: Johns Hopkins University
- A Detailed Guide to the OWASP Top 10: Packt
- Project Development in Python: Microsoft
- Prescriptive Analytics Project Ideation: University of Minnesota
- Writing Secure Code in ASP.NET: Packt
- Web Application Security: Microsoft
- Security & Ethical Hacking: Attacking Unix and Windows : University of Colorado Boulder
- Enfoques emergentes para medir la salud de la población: Johns Hopkins University
- Business Continuity and Disaster Recovery: Packt