Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "ec2 security"
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cybersecurity, Security Management, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Cyber Attacks, Malware Protection, Email Security, Vulnerability Management, Artificial Intelligence
Skills you'll gain: Extract, Transform, Load, Data Architecture, Data Pipelines, Big Data, Data Warehousing, Data Governance, Data Storage Technologies, Apache Hadoop, Relational Databases, Apache Spark, Data Lakes, Databases, SQL, Data Mart, Data Security
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Cybersecurity, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
- Status: [object Object]
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Business Software, Computer Hardware, Cybersecurity, Desktop Support, Virtual Private Networks (VPN), Network Troubleshooting, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, Operating Systems, Network Protocols, TCP/IP, Application Security, Microsoft Teams, Productivity Software, Information Systems Security, Multi-Factor Authentication
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
Skills you'll gain: System Configuration, Configuration Management, Cybersecurity, Security Awareness, Data Security, Security Controls, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Information Technology Operations, System Monitoring, Key Management, General Networking, Data Integrity
Yonsei University
Skills you'll gain: Apache Spark, Augmented Reality, Cloud Computing Architecture, Big Data, Wireless Networks, SPSS, Augmented and Virtual Reality (AR/VR), Cloud Computing, Internet Of Things, Live Streaming, Cloud Platforms, Analytics, Real Time Data, Apache Hadoop, Multimedia, Emerging Technologies, Apple iOS, Mobile Development Tools, Product Planning, Android (Operating System)
- Status: [object Object]
Microsoft
Skills you'll gain: Microsoft Power Platform, Excel Formulas, Process Flow Diagrams, Business Process Modeling, User Story, Business Requirements, Stakeholder Management, Data Modeling, Microsoft Excel, Microsoft Visio, Software Development Life Cycle, Requirements Analysis, Requirements Elicitation, Quality Management, Pivot Tables And Charts, Power BI, Project Management Life Cycle, Microsoft Power Automate/Flow, Business Analysis, Project Management
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Patch Management, Amazon CloudWatch, Infrastructure Security, Threat Detection, Amazon S3, Vulnerability Scanning, Data Security, Cloud Security, Network Security, Incident Response, Data Governance, Authorization (Computing), Continuous Monitoring, Cyber Governance, Firewall, Vulnerability Assessments, Role-Based Access Control (RBAC)
University at Buffalo
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Network Protocols, FinTech, Virtual Environment, Data Integrity, Emerging Technologies, Data Security, Data Validation
- Status: [object Object]
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Cloud Management, Microsoft Azure, Business Software, Computer Hardware, Virtual Machines, Identity and Access Management, Cybersecurity, Network Troubleshooting, Desktop Support, Virtual Private Networks (VPN), Azure Active Directory, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, System Monitoring, Virtualization and Virtual Machines, Disaster Recovery
University of Colorado System
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Web Servers, Virtual Machines, Command-Line Interface, MySQL, Linux, Debugging, Network Routing
In summary, here are 10 of our most popular ec2 security courses
- Cybersecurity Case Studies and Capstone Project:Â IBM
- Introduction to Data Engineering:Â IBM
- Hacking and Patching:Â University of Colorado System
- Microsoft IT Support Specialist:Â Microsoft
- Advanced System Security Design:Â University of Colorado System
- Security Operations:Â ISC2
- Emerging Technologies: From Smartphones to IoT to Big Data:Â Yonsei University
- Microsoft Business Analyst:Â Microsoft
- Exam Prep SCS-C02: AWS Certified Security – Specialty: Whizlabs
- Blockchain Basics:Â University at Buffalo