Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "configure security groups"
University of Alberta
Skills you'll gain: Requirements Analysis, Agile Software Development, Agile Methodology, Kanban Principles, Requirements Elicitation, Requirements Management, Functional Requirement, Business Requirements, Sprint Planning, Software Development Methodologies, Project Risk Management, Software Development Life Cycle, Scrum (Software Development), Product Requirements, User Requirements Documents, Software Development, Product Management, Development Testing, User Story, Backlogs
Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Data Lakes, Amazon DynamoDB, Amazon Web Services, Serverless Computing, Cloud Computing, Amazon S3, Scalability, Cloud Infrastructure, Amazon Elastic Compute Cloud, Event-Driven Programming, Cloud Security, Solution Architecture, Data Visualization, Cloud Computing Architecture, Cloud Solutions, Data Architecture, Amazon Redshift, Software Architecture
Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Amazon DynamoDB, Amazon Web Services, Cloud Computing, Amazon S3, Scalability, Cloud Infrastructure, Amazon Elastic Compute Cloud, Cloud Security, Serverless Computing, Cloud Storage, Databases, Virtual Private Networks (VPN), Load Balancing, General Networking, Containerization
- Status: Free
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Data Integrity, Mathematical Software, Algorithms, Probability
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Systems Development Life Cycle, Information Assurance, Internal Controls, Information Systems Security, Compliance Auditing, Risk Management, Security Controls, Change Management, System Implementation, System Monitoring, Risk Analysis, Risk Mitigation, Software Development
Skills you'll gain: Data Ethics, Data Analysis, Data Security, Google Sheets, Databases, Data Access, Data Storage, Data Quality, Data Integrity, Data Management, Data Collection, Data Manipulation, Relational Databases, SQL, Metadata Management, Unstructured Data
Northwestern University
Skills you'll gain: Influencing, Persuasive Communication, Design Thinking, Data-Driven Decision-Making, Leadership, Strategic Communication, Innovation, Collaboration, Business Leadership, Crisis Management, Negotiation, Organizational Leadership, Ideation, Team Leadership, Resource Allocation, Human Centered Design, Strategic Leadership, Corporate Communications, Marketing Analytics, Data Science
- Status: Free
Infosec
Skills you'll gain: Blockchain, Network Security, Cybersecurity, Data Security, Cryptography, Secure Coding, Encryption, Vulnerability Assessments, Scalability, Distributed Computing, Transaction Processing, Algorithms
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Record Keeping, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
University of Virginia Darden School Foundation
Skills you'll gain: Strategic Thinking, Digital Transformation, Business Strategy, Cloud Computing Architecture, Competitive Analysis, Cloud Services, Business Transformation, Cloud Security, Cloud Infrastructure, Big Data, Cloud Platforms, Data Analysis, Statistical Analysis, Cloud Computing, Artificial Intelligence, Generative AI, Data Ethics, Apache Hadoop, Product Lifecycle Management, Business Technologies
Skills you'll gain: ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Artificial Intelligence, Natural Language Processing, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Vulnerability Management, Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Image Analysis, Technical Communication
In summary, here are 10 of our most popular configure security groups courses
- Software Product Management:Â University of Alberta
- AWS Cloud Solutions Architect:Â Amazon Web Services
- AWS Cloud Technical Essentials:Â Amazon Web Services
- Cryptography I:Â Stanford University
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- Information Systems Auditing, Controls and Assurance:Â The Hong Kong University of Science and Technology
- Prepare Data for Exploration:Â Google
- Organizational Leadership:Â Northwestern University
- Blockchain Security:Â Infosec
- Sound the Alarm: Detection and Response:Â Google