Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "azure security"
University of Colorado System
Skills you'll gain: Infrastructure Security, Cyber Risk, Cyber Security Policies, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Risk Management Framework, Technology Roadmaps, Network Infrastructure, Transportation Operations, Infrastructure Architecture
University of Pennsylvania
Skills you'll gain: Law, Regulation, and Compliance, Regulation and Legal Compliance, Adjudication, Regulatory Compliance, Regulatory Requirements, Public Safety and National Security
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Application Security, Vulnerability Assessments, Vulnerability Management, Event Monitoring, Security Controls, Data Integrity, Patch Management, Network Security
Skills you'll gain: File Systems, Operating Systems, OS Process Management, C (Programming Language), System Programming, Virtualization, Data Integrity, Debugging, Systems Design, Performance Tuning, Distributed Computing, Data Storage, System Software, Virtual Machines, Command-Line Interface, Computer Systems, Data Security, Computer Hardware, Scalability, Data Structures
Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Cyber Threat Intelligence, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Risk Management, Security Awareness, Information Systems Security, Cyber Operations, Cyber Security Policies, Incident Response, Computer Security Incident Management, Network Security, Risk Analysis
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Data Security, Cloud Applications, Cloud Services, Application Security, Authorization (Computing), Cyber Risk, Secure Coding, Cloud Storage, Personally Identifiable Information, DevSecOps, General Data Protection Regulation (GDPR), Network Security, Information Privacy, Continuous Monitoring, Cloud Computing, Cybersecurity
University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, TCP/IP, Network Analysis
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Threat Management, System Monitoring, Automation
Skills you'll gain: Google Docs, Gmail, Google Sheets, Google Workspace, Presentations, Spreadsheet Software, Calendar Management, Version Control, File Management, Document Management, Excel Formulas, Excel Macros, Data Visualization, Productivity Software, Meeting Facilitation, Setting Appointments, Email Security, Product Demonstration, Sales Presentations, Collaboration
University of California, Irvine
Skills you'll gain: Network Security, Computer Hardware, Hardware Architecture, Computer Systems, TCP/IP, Information Technology, General Networking, Network Protocols, Operating Systems, System Configuration, Software Installation, Computer Networking, Software Systems, Microsoft Windows, Mac OS
Skills you'll gain: Version Control, OpenAI, GitHub, ChatGPT, Generative AI, Cloud API, Application Programming Interface (API), Application Deployment, Real Time Data, Artificial Intelligence, Image Analysis, Web Applications, Application Security
Skills you'll gain: Cyber Governance, Security Strategy, Security Management, Incident Management, Cyber Security Strategy, Business Continuity Planning, IT Security Architecture, Computer Security Incident Management, Business Continuity, Cyber Security Policies, Disaster Recovery, IT Management, Cybersecurity, Contingency Planning, Governance, Cyber Risk, Asset Management, Cyber Security Assessment, Information Assurance, Risk Analysis
Searches related to azure security
In summary, here are 10 of our most popular azure security courses
- Cybersecurity Policy for Aviation and Internet Infrastructures:Â University of Colorado System
- Nuts and Bolts of U.S. Immigration Law:Â University of Pennsylvania
- OWASP Top 10 - Risks 6-10:Â Infosec
- Introduction to Operating Systems:Â Codio
- Cybersecurity Foundations for Risk Management:Â Kennesaw State University
- Cybersecurity in the Cloud:Â University of Minnesota
- Introduction to Computer Security:Â University of London
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks:Â Google Cloud
- Getting Started with Google Workspace en Español: Google Cloud
- Computer Hardware and Software:Â University of California, Irvine