Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure control access to resources"
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Visualization, Statistical Programming, Ggplot2, Dimensionality Reduction, Data Visualization Software, Data Integration, Knitr, Data Analysis, Data Import/Export, General Science and Research, Data Sharing, Statistical Reporting
Meta
Skills you'll gain: Version Control, Unix Commands, Git (Version Control System), GitHub, Linux Commands, Command-Line Interface, Software Versioning, File Management, Software Development Tools, Software Development, Software Configuration Management
- Status: Free
Deep Teaching Solutions
Skills you'll gain: Learning Strategies, Time Management, Willingness To Learn, Mental Concentration, Creativity, Persistence, Self-Discipline, Stress Management, Self-Awareness, Adaptability
Skills you'll gain: Azure Active Directory, Active Directory, Microsoft Azure, Multi-Factor Authentication, Authentications, User Accounts, Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, Cloud Security, Single Sign-On (SSO), Hybrid Cloud Computing, Self Service Technologies
University of California, Irvine
Skills you'll gain: Data Storytelling, Data-Driven Decision-Making, Employee Training, Performance Metric, Compensation Management, Human Resources, Human Resource Strategy, Workforce Planning, Business Metrics, Data Analysis, Employee Engagement, Recruitment, Talent Acquisition, Analytics
- Status: Free
Coursera Project Network
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, User Provisioning, Role-Based Access Control (RBAC), Authorization (Computing), User Accounts, Cloud Security, Infrastructure As A Service (IaaS)
University of Colorado System
Skills you'll gain: Windows Servers, Authorization (Computing), Microsoft Windows, Authentications, User Accounts, Group Policy, Security Controls, Active Directory, Identity and Access Management, Software Installation, Servers, Encryption, Network Planning And Design, Network Performance Management
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
Skills you'll gain: Bootstrap (Front-End Framework), Software Development Life Cycle, Browser Compatibility, User Centered Design, Cloud-Native Computing, React Redux, NoSQL, Git (Version Control System), GitHub, Webpack, Application Development, MongoDB, React.js, Agile Methodology, HTML and CSS, Front-End Web Development, JavaScript Frameworks, Development Environment, Version Control, Interviewing Skills
Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Role-Based Access Control (RBAC), Authorization (Computing), User Accounts, Security Controls, OAuth, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Enterprise Security, Network Security, Network Protocols
Microsoft
Skills you'll gain: Microsoft Azure, Cloud Management, Application Deployment, Cloud Computing, Windows PowerShell, Infrastructure As A Service (IaaS), Cloud Infrastructure, Software As A Service, Virtual Machines, Platform As A Service (PaaS), Role-Based Access Control (RBAC), Command-Line Interface, Scripting
University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Usability Testing, Interaction Design, Human Factors, Information Privacy, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, Human Centered Design, Data Sharing, Design
In summary, here are 10 of our most popular secure control access to resources courses
- Data Science: Foundations using R:Â Johns Hopkins University
- Version Control:Â Meta
- Learning How to Learn: Powerful mental tools to help you master tough subjects:Â Deep Teaching Solutions
- Secure Access with Azure Active Directory:Â Microsoft
- Human Resources Analytics:Â University of California, Irvine
- Security with AWS: Identity and Access Management (IAM) :Â Coursera Project Network
- Windows Server Management and Security:Â University of Colorado System
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- IBM Front-End Developer:Â IBM
- Identity and Access Management (IAM):Â Packt