Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "database security"
University of Michigan
Skills you'll gain: Web Scraping, Data Processing, Relational Databases, JSON, Database Design, SQL, Network Protocols, Databases, Web Services, Restful API, Programming Principles, Data Cleansing, Data Structures, Data Storytelling, Data Collection, Computer Programming, Python Programming, Data Manipulation, Development Environment, Computational Thinking
Skills you'll gain: Data Storytelling, Requirements Elicitation, Business Process Modeling, Business Analysis, Data Presentation, Process Analysis, Resource Allocation, Data Visualization, Interactive Data Visualization, Stakeholder Management, Process Optimization, Business Requirements, Requirements Management, Data Modeling, Risk Analysis, Requirements Analysis, Excel Formulas, Microsoft Excel, Data Cleansing, Analysis
Skills you'll gain: MongoDB, NoSQL, Databases, PostgreSQL, Relational Databases, SQL, Applied Machine Learning, Database Management Systems, Artificial Intelligence, Database Architecture and Administration, Database Management, Natural Language Processing, Apache Cassandra, Text Mining, Node.JS, Image Analysis, Data Import/Export, Unstructured Data, Data Processing, Data Storage Technologies
Skills you'll gain: Extract, Transform, Load, Data Architecture, Data Pipelines, Big Data, Data Warehousing, Data Governance, Data Storage Technologies, Apache Hadoop, Relational Databases, Apache Spark, Data Lakes, Databases, SQL, Data Mart, Data Security
Skills you'll gain: Azure Active Directory, Data Security, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), Cloud Security, Active Directory, Threat Modeling, Security Strategy, Authentications, Data Storage, Application Security, Database Architecture and Administration, Virtual Machines, Infrastructure Security, Kubernetes, Continuous Monitoring, Web Applications, System Monitoring, Network Security
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
Skills you'll gain: Open Web Application Security Project (OWASP), Istio, Software Development Life Cycle, Linux Commands, Unit Testing, Application Deployment, Kubernetes, NoSQL, Bash (Scripting Language), MongoDB, Shell Script, Django (Web Framework), Object-Relational Mapping, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Jupyter, Grafana
University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, ISO/IEC 27001, Risk Management Framework, Information Assurance, Security Controls, Incident Response
Skills you'll gain: Data Ethics, Incident Response, Security Awareness, Computer Security Incident Management, Incident Management, Cybersecurity, Security Management, Computer Security Awareness Training, Cyber Security Policies, Artificial Intelligence, Technical Communication
Skills you'll gain: Relational Databases, Database Management Systems, SQL, Database Design, Databases, MySQL, NoSQL, Query Languages, Data Integrity, Data Modeling
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Application Specific Integrated Circuits, Cryptography, Encryption, Technical Design, Emerging Technologies, System Design and Implementation
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Systems Development Life Cycle, Information Assurance, Internal Controls, Information Systems Security, Compliance Auditing, Risk Management, Security Controls, Change Management, System Implementation, System Monitoring, Risk Analysis, Risk Mitigation, Software Development
Searches related to database security
In summary, here are 10 of our most popular database security courses
- Python for Everybody:Â University of Michigan
- IBM Business Analyst:Â IBM
- Vector Database Fundamentals:Â IBM
- Introduction to Data Engineering:Â IBM
- Microsoft Azure Security Engineer Associate (AZ-500):Â Microsoft
- ISC2 Systems Security Certified Practitioner (SSCP):Â ISC2
- IBM Back-End Development:Â IBM
- Cyber Security Fundamentals:Â University of London
- Put It to Work: Prepare for Cybersecurity Jobs:Â Google
- Introduction to Databases for Back-End Development:Â Meta