Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "authentication mechanisms"
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Cyber Risk, Threat Detection, Security Controls, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Penetration Testing, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Personally Identifiable Information, Identity and Access Management, Web Applications, Data Validation
University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Network Security, Digital Communications, Authentications, Data Integrity, Algorithms
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Threat Modeling, Personally Identifiable Information, Malware Protection, Email Security, Incident Response
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, NIST 800-53, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Usability Testing, Interaction Design, Human Factors, Information Privacy, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, Human Centered Design, Data Sharing, Design
- Status: Free
Knowledge Accelerators
Skills you'll gain: Power BI, Dashboard, Data Presentation, Data Visualization Software, Interactive Data Visualization, Data Import/Export, Business Intelligence, Microsoft Excel, Data Analysis, Data-Driven Decision-Making, Data Modeling
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Role-Based Access Control (RBAC), Containerization
Google Cloud
Skills you'll gain: Single Sign-On (SSO), User Accounts, Google Workspace, Lightweight Directory Access Protocols, Application Security, Security Management, Authentications, Multi-Factor Authentication, Identity and Access Management, Application Programming Interface (API), Cloud-Based Integration, Threat Detection
- Status: Free
Campus BBVA
Skills you'll gain: Computer Security Incident Management, Cyber Attacks, Cybersecurity, Threat Management, Security Awareness, Cyber Risk, Email Security, Data Security, Network Security, Business Process, Mobile Security, Multi-Factor Authentication
Skills you'll gain: Generative AI, Natural Language Processing, PyTorch (Machine Learning Library), ChatGPT, OpenAI, Artificial Intelligence and Machine Learning (AI/ML), Artificial Neural Networks, Deep Learning, Text Mining, Application Development, Feature Engineering, Artificial Intelligence, Document Management, Machine Learning Methods, Jupyter, Data Processing, Tensorflow, Applied Machine Learning, Application Frameworks, Performance Tuning
Korea Advanced Institute of Science and Technology(KAIST)
Skills you'll gain: Life Sciences, Physical Science, Process Analysis, Stress Management, Medical Science and Research
In summary, here are 10 of our most popular authentication mechanisms courses
- The Foundations of Cybersecurity:Â Kennesaw State University
- Identifying Security Vulnerabilities:Â University of California, Davis
- Cryptography:Â University of Maryland, College Park
- Introduction to Cybersecurity Fundamentals:Â Coursera Instructor Network
- Assets, Threats, and Vulnerabilities:Â Google
- Usable Security:Â University of Maryland, College Park
- From Excel to Power BI:Â Knowledge Accelerators
- Cloud Security Risks: Identify and Protect Against Threats:Â Google Cloud
- Google Workspace Security:Â Google Cloud
- Cybersecurity for Managers:Â Campus BBVA