Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "kafka security"
University of Colorado System
Skills you'll gain: Windows Servers, Authorization (Computing), Microsoft Windows, Authentications, User Accounts, Group Policy, Security Controls, Active Directory, Identity and Access Management, Software Installation, Servers, Encryption, Network Planning And Design, Network Performance Management
Microsoft
Skills you'll gain: Microsoft Azure, Application Security, Cloud Security, Infrastructure Security, Kubernetes, Network Security, Security Engineering, Firewall, Endpoint Security, Identity and Access Management, Infrastructure As A Service (IaaS), Role-Based Access Control (RBAC), Cloud Services, Virtual Machines, Containerization, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Private Networks (VPN), Encryption
Skills you'll gain: Identity and Access Management, Endpoint Security, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Data Security, Cyber Security Strategy, Secure Coding, Firewall, Application Security, Authentications, Security Controls, Authorization (Computing), Security Information and Event Management (SIEM), Data Governance, Incident Response
Rice University
Skills you'll gain: Apache Kafka, Apache Spark, Apache Hadoop, Distributed Computing, Java, Software Architecture, Systems Architecture, Programming Principles, Servers, Algorithms, Computer Science, Network Protocols
LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Penetration Testing, Network Security, Malware Protection, Cybersecurity, Cloud Computing, Mobile Security, Application Security, Cyber Attacks, Cyber Security Assessment, Security Testing, Threat Detection, Information Systems Security, Cyber Threat Intelligence, Intrusion Detection and Prevention, Virtualization, Firewall, Encryption, Vulnerability Assessments
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Information Systems Security, Cybersecurity, Computer Security, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Algorithms
Duke University
Skills you'll gain: Loans, Blockchain, FinTech, Lending and Underwriting, Operational Risk, Scalability, Security Testing, Interoperability, Payment Systems, General Lending, Risk Management, Consumer Lending, Derivatives, Key Management, Credit Risk, Cryptography, Emerging Technologies, Financial Regulations, Digital Assets, Financial Systems
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
Skills you'll gain: Virtualization, IBM Cloud, Virtual Machines, Infrastructure Architecture, IT Infrastructure, Computer Architecture, Data Centers, Computer Systems, Information Systems Security, Computer Hardware, Cryptography, Transaction Processing
Skills you'll gain: Cloud Security, Data Management, Cloud Computing Architecture, Records Management, Security Management, Cloud Computing, Microsoft Azure, Threat Management, Disaster Recovery, Security Strategy, Cybersecurity, Data Governance, Information Assurance, Personally Identifiable Information, Security Controls, Information Privacy, General Data Protection Regulation (GDPR), Identity and Access Management
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Cyber Risk, Threat Detection, Security Controls, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
University of California, Irvine
Skills you'll gain: Cyber Governance, Threat Management, Security Management, Cyber Risk, Compliance Management, Risk Management, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Information Assurance, Program Standards, Computer Security
Searches related to kafka security
In summary, here are 10 of our most popular kafka security courses
- Windows Server Management and Security:Â University of Colorado System
- Implement Platform Protection:Â Microsoft
- Cybersecurity Architecture:Â IBM
- Distributed Programming in Java:Â Rice University
- Certified Ethical Hacking (v12):Â LearnKartS
- Applied Cryptography:Â University of Colorado System
- Decentralized Finance (DeFi): The Future of Finance:Â Duke University
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- Introduction to Enterprise Computing:Â IBM
- Cybersecurity Management and Compliance:Â Microsoft