Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "configuring salesforce security features"
- Status: Free
University of Pennsylvania
Skills you'll gain: Calculus, Applied Mathematics, Derivatives, Engineering Calculations, Advanced Mathematics, Estimation
- Status: Free
University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Key Management, Public Key Cryptography Standards (PKCS), Network Security, Authentications, Mobile Security, Data Integrity, Algorithms
University of Minnesota
Skills you'll gain: Interoperability, Electronic Medical Record, Health Information Management and Medical Records, Health Care, Healthcare Industry Knowledge, Data Ethics, Geographic Information Systems, Nursing, Spatial Analysis, Mobile Security, Augmented and Virtual Reality (AR/VR), Medical Terminology, Emerging Technologies
Coursera Project Network
Skills you'll gain: Microsoft Excel, Spreadsheet Software, Business Intelligence, Productivity Software
Skills you'll gain: Unsupervised Learning, Dimensionality Reduction, Scikit Learn (Machine Learning Library), Machine Learning Algorithms, Feature Engineering, Machine Learning, Statistical Machine Learning, Text Mining, Data Mining, Data Science, Unstructured Data, Big Data, NumPy, Data Analysis, Natural Language Processing, Linear Algebra
University of Illinois Urbana-Champaign
Skills you'll gain: Tidyverse (R Package), Data Processing, Business Analytics, Data Wrangling, Data Transformation, Business Intelligence, Data Manipulation, R Programming, Business Process, Business Process Automation, Exploratory Data Analysis, Data Visualization, Data Analysis, Data-Driven Decision-Making, Descriptive Statistics
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Security Strategy, Risk Management Framework, Security Controls, Enterprise Security, Information Privacy
University of Illinois Urbana-Champaign
Skills you'll gain: Distributed Computing, File Systems, Cloud Computing, Transaction Processing, Network Security, Data Centers, Authorization (Computing), Apache Hadoop, Data Store, Authentications, Scalability, NoSQL, Algorithms, Encryption, Graph Theory
The Hong Kong University of Science and Technology
Skills you'll gain: Software Design Patterns, Requirements Analysis, Systems Development Life Cycle, Software Architecture, Acceptance Testing, Software Development Methodologies, Unified Modeling Language, Software Development Life Cycle, Configuration Management, Software Quality Assurance, Debugging, Engineering Software, Software Design, Process Driven Development, Software Engineering, Software Testing, Object Oriented Design, Functional Requirement, Data Modeling, Systems Design
Salesforce
Skills you'll gain: Overcoming Objections, Prospecting and Qualification, Lead Generation, Sales Development, Sales Prospecting, Cold Calling, Emotional Intelligence, Consultative Selling, Phone Sales, Selling Techniques, Sales Strategy, Rapport Building, Customer Relationship Building, Empathy, Active Listening, Persona Development
University of California, Irvine
Skills you'll gain: Network Security, Computer Hardware, Hardware Architecture, Computer Systems, TCP/IP, Information Technology, General Networking, Network Protocols, Operating Systems, System Configuration, Software Installation, Computer Networking, Software Systems, Microsoft Windows, Mac OS
IE Business School
Skills you'll gain: Product Marketing, Value Propositions, Target Market, Marketing, Strategic Marketing, Product Strategy, Market Analysis, Marketing Strategy and Techniques, Market Trend, Competitive Analysis, Consumer Behaviour
In summary, here are 10 of our most popular configuring salesforce security features courses
- Calculus: Single Variable Part 2 - Differentiation:Â University of Pennsylvania
- Introduction to Applied Cryptography:Â University of London
- Interprofessional Healthcare Informatics :Â University of Minnesota
- Finding, Sorting, & Filtering Data in Microsoft Excel:Â Coursera Project Network
- Unsupervised Machine Learning:Â IBM
- Introduction to Business Analytics with R:Â University of Illinois Urbana-Champaign
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University
- Cloud Computing Concepts: Part 2:Â University of Illinois Urbana-Champaign
- Software Engineering:Â The Hong Kong University of Science and Technology
- Conversational Selling Playbook for SDRs:Â Salesforce