Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "ec2 security"
University of Pennsylvania
Skills you'll gain: Data Ethics, Data Governance, Data Security, Governance, Business Strategy, Organizational Strategy, Business Transformation, Artificial Intelligence, Business Ethics, Analytics, Big Data, Machine Learning, Innovation, Algorithms
Skills you'll gain: ISO/IEC 27001, Risk Management, Personally Identifiable Information, Business Risk Management, Security Controls, System Implementation, Information Privacy, Security Management, Security Strategy
Google Cloud
Skills you'll gain: Cyber Operations, Security Management, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Threat Management, DevOps, Threat Detection, Cyber Security Assessment, Incident Response, Site Reliability Engineering, Digital Transformation, Agile Methodology, Automation
EIT Digital
Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Management, Data Access, Vulnerability Assessments, Encryption, Information Privacy, Data Management, Big Data, Authorization (Computing)
The Hong Kong University of Science and Technology
Skills you'll gain: Software Design Patterns, Requirements Analysis, Systems Development Life Cycle, Software Architecture, Acceptance Testing, Software Development Methodologies, Unified Modeling Language, Software Development Life Cycle, Configuration Management, Software Quality Assurance, Debugging, Engineering Software, Software Design, Process Driven Development, Software Engineering, Software Testing, Object Oriented Design, Functional Requirement, Data Modeling, Systems Design
Microsoft
Skills you'll gain: Data Storytelling, Power BI, Data Presentation, Dashboard, Data Visualization Software, Data Visualization, Microsoft Power Platform, Data Analysis, Creative Design, Data Mapping, Data Security
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Contingency Planning, Risk Management, Cyber Security Strategy, Security Management, Cybersecurity, Governance, Information Technology, Staff Management, Proposal Development, Organizational Structure, Presentations
Skills you'll gain: Continuous Monitoring, Business Continuity, ISO/IEC 27001, Security Management, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
Microsoft
Skills you'll gain: Cascading Style Sheets (CSS), GitHub, Database Management, C# (Programming Language), Microsoft SQL Servers, HTML and CSS, ASP.NET, Load Balancing, Role-Based Access Control (RBAC), Scalability, Object Oriented Programming (OOP), Authentications, Full-Stack Web Development, .NET Framework, Programming Principles, Application Programming Interface (API), Graph Theory, User Interface (UI), User Interface and User Experience (UI/UX) Design, Data Structures
University of Illinois Urbana-Champaign
Skills you'll gain: Investments, Finance, Portfolio Management, Business Valuation, Financial Modeling, Financial Market, Equities, Return On Investment, Financial Analysis, Corporate Finance, Microsoft Excel, Regression Analysis, Risk Analysis, Performance Analysis, Cash Flows
University of California, Irvine
Skills you'll gain: Swift Programming, Objective-C (Programming Language), iOS Development, Core Data (Software), Apple iOS, Apple Xcode, Model View Controller, JSON, User Interface (UI) Design, UI Components, User Interface and User Experience (UI/UX) Design, OAuth, Responsive Web Design, Prototyping, Human Computer Interaction, UI/UX Strategy, Usability Testing, Authentications, Data Mapping, Mobile Development
In summary, here are 10 of our most popular ec2 security courses
- AI Strategy and Governance:Â University of Pennsylvania
- Understanding ISO Security Standards for Your Organization:Â Codio
- Modern Security Operations:Â Google Cloud
- Security and Privacy for Big Data - Part 1:Â EIT Digital
- Software Engineering:Â The Hong Kong University of Science and Technology
- Creative Designing in Power BI :Â Microsoft
- Introduction to Applied Cryptography:Â University of Colorado System
- Road to the CISO – Culminating Project Course: Kennesaw State University
- Security and Risk Management:Â Packt
- Microsoft Full-Stack Developer:Â Microsoft