Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "aws security architecture"
Instituto Tecnológico de Aeronáutica
Skills you'll gain: Model View Controller, Selenium (Software), Web Applications, Java, JUnit, Data Access, Software Testing, Application Development, Agile Software Development, Database Management, Object Oriented Programming (OOP)
Google Cloud
Skills you'll gain: Data Governance, Data Management, Data Lakes, Data Architecture, Data Access, Cloud Storage, Metadata Management, Data Warehousing, Database Management, Relational Databases, Query Languages, NoSQL, Star Schema, Big Data, Google Cloud Platform, Data Processing, Performance Tuning
Coursera Project Network
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Information Systems Security, Data Ethics, Command-Line Interface, Technical Documentation
EDUCBA
Skills you'll gain: C (Programming Language), Embedded Systems, Embedded Software, Debugging, Systems Architecture, Microarchitecture, Computer Architecture, Data Structures, Computer Hardware, Peripheral Devices
Skills you'll gain: Cyber Security Policies, Cyber Security Assessment, Risk Management Framework, Security Management, Cyber Risk, Cybersecurity, Cyber Governance, Cyber Security Strategy, Security Awareness, Technical Communication
Skills you'll gain: Microarchitecture, Computer Architecture, Computer Hardware, Computer Systems, Embedded Systems, OS Process Management, Data Storage, Computational Logic, Other Programming Languages, C (Programming Language), C# (Programming Language)
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, Application Security, IT Security Architecture, Infrastructure Security, Cryptography, Regulation and Legal Compliance, Bash (Scripting Language), Encryption, Authorization (Computing), Risk Management, Virtualization
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Market Liquidity, Analysis, Financial Policy, Economics, International Finance, Financial Systems, Financial Market, Financial Regulation, Market Dynamics, Supply And Demand, Banking
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Threat Management, System Monitoring, Automation
Skills you'll gain: Cryptography, Data Security, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Secure Coding, Public Key Infrastructure, Security Controls, Authentications, Key Management, Identity and Access Management, Web Development, Application Security, Web Applications, Data Integrity, Multi-Factor Authentication
New York Institute of Finance
Skills you'll gain: Reinforcement Learning, Financial Trading, Deep Learning, Portfolio Management, Artificial Intelligence and Machine Learning (AI/ML), Artificial Neural Networks, Markov Model, Machine Learning, Financial Market, Time Series Analysis and Forecasting
- Status: Free
Fractal Analytics
Skills you'll gain: Behavioral Economics, Human Development, Learning Theory, Psychology, Social Sciences, Qualitative Research, Research Methodologies
Searches related to aws security architecture
In summary, here are 10 of our most popular aws security architecture courses
- Desenvolvimento Ágil com Java Avançado: Instituto Tecnológico de Aeronáutica
- Data Management and Storage in the Cloud: Google Cloud
- Metasploit for Beginners: Ethical Penetration Testing: Coursera Project Network
- Embedded Systems using C: EDUCBA
- Cybersecurity Policy Foundations: Infosec
- Introduction to Microprocessors: Arm
- Cyber Security Technologies: Illinois Tech
- Monetary Policy in the Asia Pacific: The Hong Kong University of Science and Technology
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks: Google Cloud
- Data Security for Web Developers: Codio