Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure configurations"
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, IT Security Architecture, Application Security, Infrastructure Security, Cryptography, Regulation and Legal Compliance, Bash (Scripting Language), Encryption, Authorization (Computing), Risk Management, Virtualization
LearnQuest
Skills you'll gain: Cloud Hosting, Cloud Computing, Cloud Platforms, Cloud Services, Cloud Infrastructure, Cloud Computing Architecture, Public Cloud, Infrastructure As A Service (IaaS), Serverless Computing, Virtual Machines, Hybrid Cloud Computing, Software As A Service, Private Cloud, Microsoft Azure, Platform As A Service (PaaS), Virtualization, Emerging Technologies
Skills you'll gain: Cloud Security, Internet Of Things, Network Security, Application Security, Security Engineering, Information Systems Security, Data Security, Cloud Services, Infrastructure Security, Key Management, Cloud Computing, Time Series Analysis and Forecasting, Continuous Monitoring, Application Development, Encryption, Cryptography, Data Analysis, Identity and Access Management, Data Integrity, Authentications
Northwestern University
Skills you'll gain: Engineering, Mechanics, Mathematical Modeling, Simulation and Simulation Software, Engineering Analysis, Matlab, Applied Mathematics, Physics, System Configuration, Angular
Skills you'll gain: Threat Modeling, IT Security Architecture, Network Security, Internet Of Things, Threat Detection, Cloud Security, Infrastructure Security, Vulnerability Management, Identity and Access Management, Information Systems Security, Encryption, Incident Response, Security Engineering, Threat Management, Cybersecurity, Security Controls, Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Cloud Solutions
- Status: Free
Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Public Key Infrastructure, Data Integrity
University of Colorado System
Skills you'll gain: Requirements Analysis, User Requirements Documents, Requirements Elicitation, Agile Methodology, Functional Requirement, Software Documentation, System Requirements, Software Development Life Cycle, Agile Software Development, Waterfall Methodology, Technical Communication
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Cryptography, Security Engineering, Threat Modeling, Authorization (Computing), Encryption, Email Security, Data Integrity, Authentications, Verification And Validation
Infosec
Skills you'll gain: Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Application Security, Security Testing, Authorization (Computing), Authentications, Data Validation, Encryption, Security Controls, Data Security, Vulnerability Scanning, Role-Based Access Control (RBAC), Verification And Validation, Intrusion Detection and Prevention, Security Awareness, Web Servers, Continuous Monitoring, User Accounts, Web Applications, Configuration Management
Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Vulnerability Management, Secure Coding, Encryption, Cybersecurity, Infrastructure Security, Computer Security, Threat Modeling, Public Key Infrastructure, Data Security, Authentications, Data Integrity
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, MySQL, PostgreSQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Transformation, IBM DB2, Relational Databases, Jupyter, Generative AI
University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, System Monitoring, System Implementation, Systems Administration, Virtualization, Network Security, Linux Commands
In summary, here are 10 of our most popular secure configurations courses
- Cyber Security Technologies:Â Illinois Tech
- Cloud Computing Basics (Cloud 101):Â LearnQuest
- Developing Secure IoT Applications:Â EDUCBA
- Modern Robotics, Course 1: Foundations of Robot Motion:Â Northwestern University
- Assessing and Managing Secure IoT Applications and Devices:Â LearnQuest
- Cybersecurity and Secure Software Design:Â Ball State University
- Requirements Gathering for Secure Software Development:Â University of Colorado System
- Design and Analyze Secure Networked Systems:Â University of Colorado System
- Secure Coding in Laravel:Â Infosec
- Security Architecture and Engineering:Â Packt