Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "implementing data security and access management"
- Status: Free
Coursera Project Network
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, User Provisioning, Role-Based Access Control (RBAC), Authorization (Computing), User Accounts, Cloud Security, Infrastructure As A Service (IaaS)
Skills you'll gain: Cloud Infrastructure, Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Infrastructure As A Service (IaaS), Network Monitoring, Cloud Applications, Cloud Computing Architecture, Network Architecture, Role-Based Access Control (RBAC), Network Security, Cloud Computing, Network Routing, Cloud Security, Virtual Private Networks (VPN)
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Visualization, Statistical Programming, Ggplot2, Dimensionality Reduction, Data Visualization Software, Data Integration, Knitr, Data Analysis, Data Import/Export, General Science and Research, Data Sharing, Statistical Reporting
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Google Sheets, Business Analytics, Spreadsheet Software, Analytical Skills, Data Sharing, Data Cleansing, Data Processing, Data Strategy, Data Visualization Software, SQL
University of Michigan
Skills you'll gain: Web Scraping, Data Processing, Relational Databases, JSON, Database Design, SQL, Network Protocols, Databases, Web Services, Restful API, Programming Principles, Data Cleansing, Data Structures, Data Storytelling, Data Collection, Computer Programming, Python Programming, Data Manipulation, Development Environment, Computational Thinking
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Information and Event Management (SIEM), Security Awareness
Packt
Skills you'll gain: Data Security, Data Loss Prevention, Data Management, Security Management, Security Controls, Personally Identifiable Information, Cloud Security, Information Management, Data Governance, Security Requirements Analysis
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Rice University
Skills you'll gain: Microsoft Excel, Pivot Tables And Charts, Graphing, Spreadsheet Software, Excel Formulas, Data Analysis, Histogram, Scatter Plots, Data Manipulation, Data Access, Data Import/Export
University of Michigan
Skills you'll gain: Web Scraping, JSON, Network Protocols, Web Services, Restful API, Application Programming Interface (API), Extensible Markup Language (XML), Data Import/Export, Data Processing, TCP/IP, Python Programming, Scripting, Hypertext Markup Language (HTML), Data Manipulation, Data Structures
Skills you'll gain: Azure Active Directory, Authentications, Authorization (Computing), Microsoft Azure, Identity and Access Management, User Provisioning, Role-Based Access Control (RBAC), User Accounts, Cloud Security, Security Engineering, Multi-Factor Authentication, Application Security
Skills you'll gain: Open Web Application Security Project (OWASP), Security Controls, Risk Management, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, NIST 800-53, Cyber Security Policies, Cyber Risk, Safety Audits, Threat Detection, Compliance Auditing
In summary, here are 10 of our most popular implementing data security and access management courses
- Security with AWS: Identity and Access Management (IAM) : Coursera Project Network
- Preparing for Google Cloud Certification: Cloud Security Engineer: Google Cloud
- Data Science: Foundations using R: Johns Hopkins University
- Foundations: Data, Data, Everywhere: Google
- Python for Everybody: University of Michigan
- Security Analyst Fundamentals: IBM
- Asset Security: Packt
- IT Fundamentals for Cybersecurity: IBM
- Introduction to Data Analysis Using Excel: Rice University
- Using Python to Access Web Data: University of Michigan