Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "best security practices"
Skills you'll gain: Cybersecurity, Encryption, Cyber Attacks, Email Security, Computer Security Awareness Training, Security Awareness, Data Security, Information Systems Security, Malware Protection, Authentications, Authorization (Computing), Security Controls, Hardening, Identity and Access Management, Multi-Factor Authentication, Browser Compatibility
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection, Data Sharing
Packt
Skills you'll gain: Disaster Recovery, Incident Management, Business Continuity Planning, Information Technology Operations, Threat Management, Cybersecurity, Security Information and Event Management (SIEM), Security Controls, Patch Management, Threat Detection, Intrusion Detection and Prevention, Infrastructure Security, Vulnerability Management, Safety and Security, Configuration Management, Change Control
Skills you'll gain: Secure Coding, Data Ethics, Vulnerability Assessments, Security Testing, Security Strategy, Security Engineering, Threat Modeling, Data Security, Penetration Testing, Security Controls, Artificial Intelligence, Cybersecurity, Threat Management, Encryption, Authorization (Computing)
Skills you'll gain: System Configuration, Configuration Management, Cybersecurity, Security Awareness, Data Security, Security Controls, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Information Technology Operations, System Monitoring, Key Management, General Networking, Data Integrity
DeepLearning.AI
Skills you'll gain: Tensorflow, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Performance Tuning, Machine Learning Methods, Artificial Neural Networks, Applied Machine Learning, Machine Learning, Supervised Learning, Machine Learning Algorithms, Network Architecture, Algorithms, Analysis, Debugging
Packt
Skills you'll gain: Data Security, Data Loss Prevention, Data Management, Security Management, Security Controls, Personally Identifiable Information, Cloud Security, Information Management, Data Governance, Security Requirements Analysis
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Data Security, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
Skills you'll gain: Security Controls, Information Assurance, Cybersecurity, Risk Management Framework, Information Systems Security, Security Awareness, Cyber Governance, Security Management, Cyber Security Policies, Cyber Risk, Data Ethics, Data Integrity
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Systems Development Life Cycle, Information Assurance, Internal Controls, Information Systems Security, Compliance Auditing, Risk Management, Security Controls, Change Management, System Implementation, System Monitoring, Risk Analysis, Risk Mitigation, Software Development
Skills you'll gain: CI/CD, Open Web Application Security Project (OWASP), Istio, Continuous Integration, Agile Software Development, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Kubernetes, Jenkins, Code Coverage, OpenShift, Cloud Applications, Containerization, Agile Methodology, Behavior-Driven Development, DevOps, Secure Coding, Grafana, System Monitoring
Skills you'll gain: Software Design Patterns, Maintainability, Secure Coding, Java Platform Enterprise Edition (J2EE), Software Design, Java, Authentications, Application Security, Scalability, Software Architecture, System Monitoring, System Design and Implementation, Performance Tuning, Authorization (Computing), Debugging, Programming Principles, Continuous Monitoring
In summary, here are 10 of our most popular best security practices courses
- Introduction to Cybersecurity Essentials:Â IBM
- Proactive Computer Security:Â University of Colorado System
- Security Operations:Â Packt
- Security for Artificial Intelligence Software and Services:Â Board Infinity
- Security Operations:Â ISC2
- Improving Deep Neural Networks: Hyperparameter Tuning, Regularization and Optimization:Â DeepLearning.AI
- Asset Security:Â Packt
- Secure Coding Practices:Â University of California, Davis
- Security Principles:Â ISC2
- Information Systems Auditing, Controls and Assurance:Â The Hong Kong University of Science and Technology