Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "developing a security strategy for edge networks"
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
DeepLearning.AI
Skills you'll gain: Deep Learning, Artificial Neural Networks, Tensorflow, Supervised Learning, Keras (Neural Network Library), Artificial Intelligence, Machine Learning, Python Programming, NumPy, Performance Tuning
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
- Status: [object Object]
Skills you'll gain: Media Planning, Search Engine Marketing, Email Marketing, Data Storytelling, Social Media Strategy, Search Engine Optimization, Social Media, Social Media Marketing, Content Creation, Order Fulfillment, A/B Testing, Target Audience, Digital Marketing, E-Commerce, Loyalty Programs, Social Media Management, Customer Retention, Persona Development, Performance Measurement, Marketing Automation
- Status: Free
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Computer Security Awareness Training, Threat Detection, General Networking, Vulnerability
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
Skills you'll gain: Network Security, Encryption, Cybersecurity, Security Awareness, Cyber Attacks, Security Management, Security Strategy, Threat Detection, Firewall, Wireless Networks, Technical Support, Malware Protection, Authentications, Multi-Factor Authentication, Authorization (Computing), Generative AI
Kennesaw State University
Skills you'll gain: Network Security, Security Management, Firewall, Cyber Attacks, Network Monitoring, Cybersecurity, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, Continuous Monitoring, TCP/IP, Intrusion Detection and Prevention, Threat Detection, Mobile Security, Cryptography, Encryption
DeepLearning.AI
Skills you'll gain: Data Ethics, Market Opportunities, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Team Building, Machine Learning, Strategic Thinking, Generative AI, Data Science, Deep Learning, Business Ethics, Artificial Neural Networks, Business Transformation
- Status: Free
University of London
Skills you'll gain: Corporate Strategy, Business Strategy, Organizational Strategy, Strategic Decision-Making, Business, Mergers & Acquisitions, Growth Strategies, New Business Development, Business Valuation, Resource Allocation, Analysis
Skills you'll gain: Security Controls, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Security Policies, Network Analysis, Security Information and Event Management (SIEM), Ethical Standards And Conduct, SQL
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
In summary, here are 10 of our most popular developing a security strategy for edge networks courses
- Connect and Protect: Networks and Network Security: Google
- Neural Networks and Deep Learning: DeepLearning.AI
- IBM Cybersecurity Analyst: IBM
- Google Digital Marketing & E-commerce: Google
- Cybersecurity for Everyone: University of Maryland, College Park
- Google Cybersecurity: Google
- IT Security: Defense against the digital dark arts : Google
- Managing Network Security: Kennesaw State University
- AI For Everyone: DeepLearning.AI
- Corporate Strategy : University of London