Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security performance"
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, Network Architecture, Routing Protocols, Network Protocols, OSI Models, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks
- Status: [object Object]
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
University of Illinois Urbana-Champaign
Skills you'll gain: Investments, Finance, Portfolio Management, Business Valuation, Financial Modeling, Financial Market, Equities, Return On Investment, Financial Analysis, Corporate Finance, Microsoft Excel, Regression Analysis, Risk Analysis, Performance Analysis, Cash Flows
Microsoft
Skills you'll gain: Virtual Private Networks (VPN), Cybersecurity, Multi-Factor Authentication, Authentications, Information Systems Security, Network Security, Technical Support and Services, Information Privacy, Servers, Cloud Computing, Cloud Security, Network Administration, Encryption, Identity and Access Management, Mac OS
DeepLearning.AI
Skills you'll gain: Computer Vision, Deep Learning, Image Analysis, Natural Language Processing, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Tensorflow, Supervised Learning, Keras (Neural Network Library), Artificial Intelligence, Applied Machine Learning, PyTorch (Machine Learning Library), Machine Learning, Debugging, Performance Tuning, Machine Learning Methods, Python Programming, Data-Driven Decision-Making, Text Mining, Network Architecture
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection, Data Sharing
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
DeepLearning.AI
Skills you'll gain: Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Applied Machine Learning, Machine Learning, Debugging, Supervised Learning, Data-Driven Decision-Making, Performance Tuning
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
Skills you'll gain: Security Controls, Information Assurance, Cybersecurity, Risk Management Framework, Information Systems Security, Security Awareness, Cyber Governance, Security Management, Cyber Security Policies, Cyber Risk, Data Ethics, Data Integrity
University of Pennsylvania
Skills you'll gain: Operations Management, Return On Investment, Operational Efficiency, Financial Statements, Financial Statement Analysis, Finance, Human Capital, Go To Market Strategy, Process Analysis, Branding, People Management, Financial Reporting, Capital Budgeting, Financial Accounting, Operational Performance Management, Consumer Behaviour, Leadership and Management, Marketing Planning, Peer Review, Analysis
Skills you'll gain: Data Ethics, Data Analysis, Data Security, Google Sheets, Databases, Data Storage, Data Quality, Data Integrity, Data Management, Data Collection, Data Manipulation, Relational Databases, SQL, Metadata Management, Unstructured Data
In summary, here are 10 of our most popular security performance courses
- The Bits and Bytes of Computer Networking: Google
- Microsoft Cybersecurity Analyst: Microsoft
- Investments I: Fundamentals of Performance Evaluation: University of Illinois Urbana-Champaign
- Cybersecurity and Privacy: Microsoft
- Deep Learning: DeepLearning.AI
- Proactive Computer Security: University of Colorado System
- Operating Systems: Overview, Administration, and Security: IBM
- Structuring Machine Learning Projects: DeepLearning.AI
- Sound the Alarm: Detection and Response: Google
- Security Principles: ISC2