Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "configuring salesforce security features"
Skills you'll gain: ISO/IEC 27001, Risk Management, Personally Identifiable Information, Business Risk Management, Security Controls, System Implementation, Information Privacy, Security Management, Security Strategy
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Network Security, Threat Detection, Firewall, Code Review, Routing Protocols, Proxy Servers, Linux, Internet Of Things, Servers
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Contingency Planning, Risk Management, Cyber Security Strategy, Security Management, Cybersecurity, Governance, Information Technology, Staff Management, Proposal Development, Organizational Structure, Presentations
- Status: Free
University of Pennsylvania
Skills you'll gain: Aesthetics, Liberal Arts, Creativity, Anthropology, Timelines, Social Studies, Cultural Diversity, Research Methodologies, Investigation
Edureka
Skills you'll gain: Cybersecurity, Secure Coding, Cyber Security Strategy, Threat Detection, Network Security, Application Security, IT Security Architecture, Generative AI, Endpoint Security, Incident Response, Artificial Intelligence, Automation
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Cloud Applications, Application Security, Secure Coding, DevSecOps, Cloud Computing, Identity and Access Management, Multi-Factor Authentication, Threat Modeling, Cryptography, Security Controls, Web Services
Microsoft
Skills you'll gain: Data Storytelling, Power BI, Data Presentation, Dashboard, Data Visualization Software, Data Visualization, Microsoft Power Platform, Data Analysis, Creative Design, Data Mapping, Data Security
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Information Systems Security, Cybersecurity, Computer Security, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Algorithms
University of Minnesota
Skills you'll gain: Software Development Methodologies, Agile Methodology, Software Engineering, Software Development Life Cycle, Requirements Analysis, Application Deployment, Agile Software Development, Systems Development, Software Architecture, Verification And Validation, Software Development, Process Driven Development, Waterfall Methodology, Software Testing, Scrum (Software Development), Release Management, Development Testing, Maintainability
Whizlabs
Skills you'll gain: Infrastructure Security, Vulnerability Scanning, Network Security, Amazon Web Services, Firewall, Vulnerability Assessments, Network Infrastructure, Virtual Private Networks (VPN), Security Controls, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Network Routing, Load Balancing
University of London
Skills you'll gain: MongoDB, JavaScript Frameworks, Web Development Tools, Web Applications, Web Development, Database Application, User Accounts, Application Security, Package and Software Management, Javascript, Software Installation
University of Illinois Urbana-Champaign
Skills you'll gain: Distributed Computing, NoSQL, Operating Systems, Apache Cassandra, Cloud Computing, Systems Design, Data Storage Technologies, Apache Hadoop, Database Theory, Algorithms, Data Structures, Scalability, C++ (Programming Language), Network Protocols
In summary, here are 10 of our most popular configuring salesforce security features courses
- Understanding ISO Security Standards for Your Organization:Â Codio
- DDoS Attacks and Defenses:Â University of Colorado System
- Road to the CISO – Culminating Project Course: Kennesaw State University
- Wonders of Ancient Egypt:Â University of Pennsylvania
- Gen AI in Cybersecurity:Â Edureka
- Cloud Application Security:Â University of Minnesota
- Creative Designing in Power BI :Â Microsoft
- Applied Cryptography:Â University of Colorado System
- Software Development Processes and Methodologies:Â University of Minnesota
- AWS: Infrastructure Security:Â Whizlabs