Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "backup and security configuration"
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Systems Development Life Cycle, Information Assurance, Internal Controls, Information Systems Security, Compliance Auditing, Risk Management, Security Controls, Change Management, System Implementation, System Monitoring, Risk Analysis, Risk Mitigation, Software Development
Stanford University
Skills you'll gain: Data Structures, Graph Theory, Algorithms, Bioinformatics, Theoretical Computer Science, Computational Thinking, Network Analysis, Network Routing, Analysis, Probability, Design Strategies, Computer Science
University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Information Assurance, Security Controls, Incident Response
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
Skills you'll gain: Istio, Open Web Application Security Project (OWASP), Software Development Life Cycle, Linux Commands, Unit Testing, Object-Relational Mapping, Application Deployment, NoSQL, Kubernetes, Bash (Scripting Language), MongoDB, Shell Script, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Serverless Computing, Jupyter, Grafana
Skills you'll gain: Design Thinking, User Research, User Experience Design, User Centered Design, Web Content Accessibility Guidelines, Usability Testing, Prototyping, Wireframing, Sprint Planning
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, General Networking, Routing Protocols, Network Protocols, Network Routing, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks, Data Integrity
Skills you'll gain: React Native, Jest (JavaScript Testing Framework), Version Control, User Research, UI/UX Research, Usability Testing, Unix Commands, Restful API, Git (Version Control System), Persona (User Experience), GitHub, Interaction Design, User Experience Design, SQL, User Interface and User Experience (UI/UX) Design, Mobile Development, Design Research, Cross Platform Development, React.js, Web Development Tools
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
- Status: AI skills
Skills you'll gain: Data Storytelling, Dashboard, Data Visualization Software, Plotly, Data Presentation, Data Wrangling, Data Visualization, SQL, Generative AI, Interactive Data Visualization, Exploratory Data Analysis, Data Cleansing, Big Data, Jupyter, Matplotlib, Data Analysis, Statistical Analysis, Pandas (Python Package), Excel Formulas, Professional Networking
Skills you'll gain: Data Storytelling, Data Presentation, Interactive Data Visualization, Data Visualization Software, Data Visualization, Shiny (R Package), Data Wrangling, Exploratory Data Analysis, Statistical Visualization, Relational Databases, Big Data, Ggplot2, Database Design, Data Analysis, Data Mining, Dashboard, Excel Formulas, Data Manipulation, Web Scraping, Microsoft Excel
Skills you'll gain: Package and Software Management, File Systems, Microsoft Windows, Desktop Support, Linux, Operating Systems, OS Process Management, Linux Administration, Remote Access Systems, System Monitoring, Command-Line Interface, User Accounts, Systems Administration, Windows PowerShell, Technical Support and Services, File Management, Linux Commands, Software Installation, Identity and Access Management, Authorization (Computing)
In summary, here are 10 of our most popular backup and security configuration courses
- Information Systems Auditing, Controls and Assurance: The Hong Kong University of Science and Technology
- Algorithms: Stanford University
- Cyber Security Fundamentals: University of London
- International Cyber Conflicts: The State University of New York
- IBM Back-End Development: IBM
- Foundations of User Experience (UX) Design: Google
- The Bits and Bytes of Computer Networking: Google
- Meta React Native: Meta
- Assets, Threats, and Vulnerabilities: Google
- IBM Data Analyst: IBM