Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "identify security challenges"
Skills you'll gain: Cloud Computing Architecture, Peripheral Devices, Cloud Services, Cybersecurity, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Cloud Platforms, Encryption, Data Storage, Cyber Attacks, Software Development Life Cycle, Networking Hardware, Application Development, Information Technology, Cloud Computing, Databases, Computer Hardware, Computer Systems
Skills you'll gain: ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Artificial Intelligence, Natural Language Processing, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Vulnerability Management, Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Image Analysis, Technical Communication
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Peripheral Devices, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Cybersecurity, Configuration Management, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Security Awareness, Cloud Platforms
Skills you'll gain: NoSQL, Data Warehousing, SQL, Apache Hadoop, Extract, Transform, Load, Apache Airflow, Data Security, Linux Commands, Data Migration, Database Design, Data Governance, MySQL, Apache Spark, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Cloud Storage
Skills you'll gain: Data Mining, Artificial Intelligence, Generative AI, Data Ethics, OpenAI, Artificial Intelligence and Machine Learning (AI/ML), Big Data, Information Architecture, Strategic Decision-Making, Cloud Computing, Data Analysis, Data Science, Deep Learning, Digital Transformation, Data Strategy, Data-Driven Decision-Making, Artificial Neural Networks, Business Strategy, Business Process Automation, ChatGPT
Skills you'll gain: Cloud Computing Architecture, Peripheral Devices, Technical Support, Cloud Services, Cybersecurity, Computing Platforms, Hardware Troubleshooting, IT Service Management, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Desktop Support, Encryption, Data Storage, Software Development Life Cycle, Professional Networking, Information Technology, Cloud Computing, Interviewing Skills, Computer Hardware
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, MySQL, PostgreSQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Transformation, IBM DB2, Relational Databases, Jupyter, Generative AI
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Presentation, Data Governance, Data Security, Data Migration, Database Design, Data Visualization, Interactive Data Visualization, Descriptive Statistics, Data Mining, Cloud Storage, Data Visualization Software, Extract, Transform, Load, IBM DB2, Data Management, MySQL, Excel Formulas
Skills you'll gain: Site Reliability Engineering, Cloud Infrastructure, Kubernetes, Application Performance Management, Google Cloud Platform, System Monitoring, Infrastructure As A Service (IaaS), Application Deployment, Identity and Access Management, Cloud Applications, CI/CD, Containerization, Cloud Computing, Cloud Security, Cloud Management, Service Level Agreement, Continuous Delivery, Safety Culture, Network Monitoring, Continuous Integration
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
University of California, Irvine
Skills you'll gain: Cyber Governance, Threat Management, Security Management, Cyber Risk, Compliance Management, Risk Management, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Information Assurance, Program Standards, Computer Security
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Cryptographic Protocols, Data Security, Email Security, Computer Security Awareness Training, Advanced Encryption Standard (AES), Security Awareness, Key Management, Secure Coding, Technical Support and Services, Information Technology, Cyber Security Strategy
In summary, here are 10 of our most popular identify security challenges courses
- Information Technology (IT) and Cloud Fundamentals:Â IBM
- IBM Generative AI for Cybersecurity Professionals:Â IBM
- IBM and ISC2 Cybersecurity Specialist:Â IBM
- IBM Data Architect:Â IBM
- IBM AI Foundations for Business:Â IBM
- IBM IT Support:Â IBM
- IBM Relational Database Administrator:Â IBM
- IBM Data Management:Â IBM
- Preparing for Google Cloud Certification: Cloud DevOps Engineer:Â Google Cloud
- Cyber Security – Technology and Governance: Royal Holloway, University of London