Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security best practices"
University of Colorado System
Skills you'll gain: Linux Administration, Linux, Linux Servers, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Server Administration, Authorization (Computing), Network Administration, Information Systems Security, Authentications
Skills you'll gain: Identity and Access Management, Cloud Security, DevSecOps, Cloud Computing, Role-Based Access Control (RBAC), Google Cloud Platform, Network Security, Cloud Computing Architecture, IT Automation, General Networking, Infrastructure Security, Security Controls, Infrastructure as Code (IaC), Virtualization
EC-Council
Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Security Awareness, Cyber Threat Intelligence, Cybersecurity, Intrusion Detection and Prevention, Cyber Attacks, Application Security, Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Data Security, Application Security, Vulnerability Management, Threat Detection, Malware Protection, Infrastructure Security, Continuous Monitoring, IT Automation, Identity and Access Management
Skills you'll gain: Media Planning, A/B Testing, Campaign Management, Key Performance Indicators (KPIs), Marketing Analytics, Marketing Effectiveness, Performance Measurement, Google Analytics, Advertising Campaigns, Return On Investment, Performance Metric, Spreadsheet Software, Marketing, Web Analytics, Digital Marketing, Data Visualization Software, Pivot Tables And Charts, Stakeholder Communications, Goal Setting, Google Sheets
- Status: Free
Universiteit Leiden
Skills you'll gain: Risk Management, Safety and Security, Threat Management, Crisis Management, Public Safety and National Security, Cybersecurity, Analysis, Complex Problem Solving, International Relations, Governance, Political Sciences
- Status: Free
University of Cape Town
Skills you'll gain: Biostatistics, Statistical Hypothesis Testing, Clinical Research, Medical Science and Research, Quantitative Research, Statistics, Descriptive Statistics, Statistical Inference, Probability
Skills you'll gain: Jenkins, Continuous Integration, System Monitoring, Systems Administration, Continuous Monitoring, Test Automation, CI/CD, Configuration Management, Test Tools, Server Administration, Code Review, Security Management, Authorization (Computing), Disaster Recovery
Skills you'll gain: OAuth, API Gateway, Cloud API, Application Programming Interface (API), API Design, Restful API, Authentications, Security Controls, Authorization (Computing), Application Security, Information Systems Security, Network Security, Data Security, JSON, Identity and Access Management
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Identity and Access Management, Business Risk Management, Security Controls
University of Toronto
Skills you'll gain: Computer Vision, Image Analysis, Embedded Software, Automation, Deep Learning, Simulation and Simulation Software, Software Architecture, Safety Assurance, Artificial Neural Networks, Global Positioning Systems, Visualization (Computer Graphics), Hardware Architecture, Process Control, Systems Architecture, Graph Theory, Estimation, Algorithms, Artificial Intelligence, Machine Learning Methods, Mathematical Modeling
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Infrastructure Security, Firewall, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing, System Configuration
In summary, here are 10 of our most popular security best practices courses
- Linux Server Management and Security:Â University of Colorado System
- Introduction to Security Principles in Cloud Computing:Â Google Cloud
- Ethical Hacking Essentials (EHE):Â EC-Council
- Mitigating Security Vulnerabilities on Google Cloud:Â Google Cloud
- Assess for Success: Marketing Analytics and Measurement:Â Google
- Security & Safety Challenges in a Globalized World:Â Universiteit Leiden
- Understanding Clinical Research: Behind the Statistics:Â University of Cape Town
- Continuous Monitoring with Jenkins & Best Practices:Â LearnKartS
- API Security on Google Cloud's Apigee API Platform:Â Google Cloud
- Tools for Security Specialists:Â Codio