Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security & accessibility best practices"
Board Infinity
Skills you'll gain: Usability Testing, User Research, Usability, User Acceptance Testing (UAT), UI/UX Research, Software Testing, Human Computer Interaction, Survey Creation, User Experience Design, Software Quality (SQA/SQC), Web Content Accessibility Guidelines
DeepLearning.AI
Skills you'll gain: Tensorflow, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Performance Tuning, Machine Learning Methods, Artificial Neural Networks, Applied Machine Learning, Machine Learning, Supervised Learning, Machine Learning Algorithms, Network Architecture, Algorithms, Analysis, Debugging
Skills you'll gain: Cybersecurity, Encryption, Cyber Attacks, Email Security, Computer Security Awareness Training, Security Awareness, Data Security, Information Systems Security, Malware Protection, Authentications, Authorization (Computing), Security Controls, Hardening, Identity and Access Management, Multi-Factor Authentication, Browser Compatibility
Skills you'll gain: CI/CD, Open Web Application Security Project (OWASP), Istio, Continuous Integration, Agile Software Development, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Kubernetes, Jenkins, DevOps, Code Coverage, OpenShift, Cloud Applications, Containerization, Agile Methodology, Behavior-Driven Development, Secure Coding, Grafana, System Monitoring
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cybersecurity, Threat Management, Security Controls, Threat Detection, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Cyber Security Assessment, Data Security, Network Security, Enterprise Security, Information Assurance, Incident Response, Data Integrity
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Systems Development Life Cycle, Information Assurance, Internal Controls, Information Systems Security, Compliance Auditing, Risk Management, Security Controls, Change Management, System Implementation, System Monitoring, Risk Analysis, Risk Mitigation, Software Development
University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Usability Testing, Interaction Design, Human Factors, Information Privacy, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, Human Centered Design, Data Sharing, Design
Skills you'll gain: Security Controls, Information Assurance, Cybersecurity, Risk Management Framework, Information Systems Security, Security Awareness, Cyber Governance, Security Management, Cyber Security Policies, Cyber Risk, Data Ethics, Data Integrity
Skills you'll gain: Secure Coding, Data Ethics, Vulnerability Assessments, Security Testing, Security Strategy, Security Engineering, Threat Modeling, Data Security, Penetration Testing, Security Controls, Artificial Intelligence, Cybersecurity, Threat Management, Encryption, Authorization (Computing)
Kennesaw State University
Skills you'll gain: Network Security, Incident Response, Vulnerability Management, Cybersecurity, Contingency Planning, Cyber Governance, Cyber Attacks, Disaster Recovery, Computer Security Incident Management, Cyber Security Policies, Security Management, Firewall, Network Monitoring, Cyber Security Strategy, Crisis Management, Vulnerability Assessments, Cyber Security Assessment, Cyber Risk, Network Protocols, Risk Management
Skills you'll gain: System Configuration, Configuration Management, Cybersecurity, Security Awareness, Data Security, Security Controls, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Information Technology Operations, System Monitoring, Key Management, General Networking, Data Integrity
In summary, here are 10 of our most popular security & accessibility best practices courses
- Advanced Usability and Accessibility Practices:Â Board Infinity
- Improving Deep Neural Networks: Hyperparameter Tuning, Regularization and Optimization:Â DeepLearning.AI
- Introduction to Cybersecurity Essentials:Â IBM
- IBM Applied DevOps Engineering:Â IBM
- Cybersecurity Best Practices:Â Coursera Instructor Network
- Security Concepts and Practices:Â ISC2
- Information Systems Auditing, Controls and Assurance:Â The Hong Kong University of Science and Technology
- Usable Security:Â University of Maryland, College Park
- Security Principles:Â ISC2
- Security for Artificial Intelligence Software and Services:Â Board Infinity