Filter by
The language used throughout the course, in both instruction and assessments.
Results for "application layer security"
Skills you'll gain: Secure Coding, Penetration Testing, Application Security, Payment Systems, Continuous Monitoring, Blockchain, Incident Response, Code Review, Vulnerability Assessments, Data Security, Development Testing, Authorization (Computing), Data Validation
Skills you'll gain: Continuous Monitoring, Business Continuity, Security Management, ISO/IEC 27001, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Contingency Planning, Risk Management, Cyber Security Strategy, Security Management, Cybersecurity, Governance, Information Technology, Staff Management, Proposal Development, Organizational Structure, Presentations
Packt
Skills you'll gain: Data Security, Data Loss Prevention, Data Management, Security Management, Security Controls, Personally Identifiable Information, Cloud Security, Information Management, Data Governance, Security Requirements Analysis
University of California, Irvine
Skills you'll gain: Vendor Management, Security Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Security Controls, Human Factors (Security), Asset Protection, Due Diligence
Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Application Security, Information Systems Security, Data Security, Cryptography, Endpoint Security, OSI Models, Encryption, Wireless Networks, Malware Protection, Public Key Infrastructure, Mobile Security, Network Protocols, Virtualization
Skills you'll gain: Incident Response, IT Security Architecture, Identity and Access Management, Continuous Monitoring, Network Security, Security Awareness, Information Systems Security, Security Information and Event Management (SIEM), Application Security, Disaster Recovery, Security Controls, Cloud Security, Cyber Security Strategy, Threat Detection, Cyber Governance, Risk Management Framework, Authentications
University of Colorado Boulder
Skills you'll gain: Internet Of Things, General Networking, Computer Networking, Wireless Networks, Network Protocols, Information Systems Security, Automation, Computer Security, Emerging Technologies, Operating Systems, Encryption, Interoperability, Information Technology, Software Systems, Cloud Services, Cloud Platforms, Data Integrity
Skills you'll gain: Cryptography, Data Security, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Secure Coding, Public Key Infrastructure, Security Controls, Authentications, Key Management, Identity and Access Management, Web Development, Application Security, Web Applications, Data Integrity, Multi-Factor Authentication
Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Secure Coding, Application Security, Identity and Access Management, Information Systems Security Assessment Framework (ISSAF), Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Systems Architecture, Security Strategy, Security Engineering, Zero Trust Network Access, Security Awareness, Security Information and Event Management (SIEM), Risk Management Framework, Disaster Recovery, Security Requirements Analysis
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
University of Colorado System
Skills you'll gain: Infrastructure Security, Cyber Risk, Cyber Security Policies, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Risk Management Framework, Technology Roadmaps, Network Infrastructure, Transportation Operations, Infrastructure Architecture
In summary, here are 10 of our most popular application layer security courses
- Security and Auditing in Ethereum: EDUCBA
- Security and Risk Management: Packt
- Road to the CISO – Culminating Project Course: Kennesaw State University
- Asset Security: Packt
- Personnel & Third-Party Security: University of California, Irvine
- Cryptography, Network Security, and Application Security: Packt
- Managing Information System Security Architecture: LearnQuest
- Industrial IoT Markets and Security: University of Colorado Boulder
- Data Security for Web Developers: Codio
- Designing Information System Security Architectures: LearnQuest