Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "configuring salesforce security features"
Skills you'll gain: Remote Access Systems, Security Management, Computer Security Incident Management, Data Security, Cybersecurity, Security Controls, Security Strategy, Incident Response, Continuous Monitoring, End User Training and Support, Human Factors (Security), Security Awareness, General Data Protection Regulation (GDPR), System Implementation
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Regulatory Compliance, General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Compliance Auditing, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Regulatory Requirements, Communication Planning, Risk Management, Internal Communications, Procedure Development, Data Security, Continuous Monitoring, Business Ethics, Governance, Internal Controls, Risk Analysis
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cloud Security, Oracle Cloud, Identity and Access Management, Encryption, Infrastructure Security, Network Security, Data Security, Continuous Monitoring, Security Controls, Cloud Computing, Cloud Infrastructure, Security Strategy, Threat Detection, Data Encryption Standard, Authorization (Computing), Authentications
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Information Systems Security, Cybersecurity, Computer Security, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Algorithms
Skills you'll gain: General Networking, Network Architecture, Threat Management, Cybersecurity, Networking Hardware, Information Technology, Network Security, Network Routers, Security Controls, Cyber Attacks, Network Switches, Firewall, Security Strategy
Palo Alto Networks
Skills you'll gain: Cyber Operations, Endpoint Detection and Response, Endpoint Security, Security Information and Event Management (SIEM), Zero Trust Network Access, Cybersecurity, Cyber Threat Intelligence, Threat Modeling, Continuous Monitoring, Security Controls, IT Security Architecture, Threat Detection, Incident Response, Malware Protection, Automation, Authentications, Data Lakes
- Status: [object Object]
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Cloud Management, Microsoft Azure, Business Software, Computer Hardware, Virtual Machines, Identity and Access Management, Cybersecurity, Network Troubleshooting, Desktop Support, Virtual Private Networks (VPN), Azure Active Directory, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, System Monitoring, Virtualization and Virtual Machines, Disaster Recovery
University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Security Management, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, Risk Management Framework
- Status: Free
University of Pennsylvania
Skills you'll gain: Anthropology, Social Studies, Timelines, Liberal Arts, Cultural Diversity, Governance, Investigation, Storytelling
University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geospatial Information and Technology, Encryption, Data Security, Network Security, Information Systems Security, Cryptography, Wireless Networks
Workday
Skills you'll gain: Workday (Software), Security Controls, Business Process, Workflow Management, Business Reporting, Human Resources Software, System Configuration, Role-Based Access Control (RBAC), Organizational Structure
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Infrastructure As A Service (IaaS), Cloud Applications, Cloud Security, Containerization, Data Loss Prevention, Cloud Storage, Network Infrastructure, Security Management, Cloud Computing, Encryption, Virtual Private Networks (VPN), User Provisioning, Data Encryption Standard, Virtual Machines, Application Security
In summary, here are 10 of our most popular configuring salesforce security features courses
- Advanced Techniques for Implementing Security Services: LearnQuest
- Regulatory Compliance: University of Pennsylvania
- Demystifying Oracle Cloud Infrastructure (OCI) Security: Coursera Instructor Network
- Applied Cryptography: University of Colorado System
- Security Administration with Cisco Defense Orchestrator: LearnQuest
- Palo Alto Networks Security Operations Fundamentals: Palo Alto Networks
- Microsoft Cloud Support Associate: Microsoft
- Homeland Security & Cybersecurity Connection - It's Not About the Terrorists: University of Colorado System
- Introduction to Ancient Egypt and Its Civilization: University of Pennsylvania
- Advanced System Security Topics: University of Colorado System