Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "wireless security"
Skills you'll gain: Power BI, Dashboard, SQL, Microsoft SQL Servers, Business Intelligence, Data Security, Data Analysis, Data Visualization Software, Data Modeling, Data Management, Data-Driven Decision-Making
University of Pennsylvania
Skills you'll gain: Blockchain, Cryptography, Digital Assets, Investments, Portfolio Management, Investment Management, FinTech, Asset Management, Financial Analysis, Financial Market, Emerging Technologies, Public Key Infrastructure, Finance, Payment Systems, Encryption, Return On Investment, Data Security, Data Integrity, Risk Analysis
University of London
Skills you'll gain: MongoDB, JavaScript Frameworks, Web Development Tools, Web Applications, Web Development, Database Application, User Accounts, Application Security, Package and Software Management, Javascript, Software Installation
University of Colorado System
Skills you'll gain: TCP/IP, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, Network Routing, Computer Networking, Software-Defined Networking, Virtualization
New York University
Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Information Privacy, Personally Identifiable Information, Regulatory Compliance, Compliance Management, Compliance Training, Data Security, Health Care Procedure and Regulation, Data Governance, Incident Response
University of Alberta
Skills you'll gain: Sprint Planning, Project Risk Management, User Story, Backlogs, Agile Methodology, User Requirements Documents, Functional Requirement, Agile Project Management, Requirements Analysis
Skills you'll gain: Continuous Monitoring, Business Continuity, ISO/IEC 27001, Security Management, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
- Status: Free
UNSW Sydney (The University of New South Wales)
Skills you'll gain: Systems Engineering, Engineering Management, Conceptual Design, Systems Design, Requirements Analysis, Systems Development Life Cycle, Requirements Elicitation, Systems Architecture, Systems Integration, System Design and Implementation, Technical Design, Configuration Management, Prototyping, Verification And Validation
Skills you'll gain: API Design, Restful API, API Gateway, Application Programming Interface (API), Cloud API, Application Lifecycle Management, Proxy Servers, Cloud Applications, Software Design Documents, Software Documentation, Google Cloud Platform, Authentications
Skills you'll gain: Cost Management, Quality Management, Backlogs, Project Closure, Project Planning, Sprint Retrospectives, Project Scoping, Team Leadership, Project Management Life Cycle, Agile Project Management, Communication Planning, Continuous Improvement Process, Process Improvement, Project Management Software, Project Management, Change Control, Project Controls, Agile Methodology, Requirements Analysis, Change Management
Microsoft
Skills you'll gain: Business Software, Computer Hardware, Hardware Architecture, Generative AI, Operating Systems, Data Storage Technologies, Computer Systems, Data Maintenance, Enterprise Security, System Software, Information Technology, OS Process Management, Data Storage, System Configuration, Microsoft Windows, Technical Support, Servers, Cybersecurity
In summary, here are 10 of our most popular wireless security courses
- Deploy and Maintain Power BI Assets and Capstone project:Â Microsoft
- Cryptocurrency and Blockchain: An Introduction to Digital Currencies:Â University of Pennsylvania
- Introduction to Meteor.js Development :Â University of London
- TCP/IP and Advanced Topics:Â University of Colorado System
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- Privacy Law and Data Protection:Â University of Pennsylvania
- Agile Planning for Software Products:Â University of Alberta
- Security and Risk Management:Â Packt
- Introduction to Systems Engineering:Â UNSW Sydney (The University of New South Wales)
- API Design and Fundamentals of Google Cloud's Apigee API Platform:Â Google Cloud