Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "ec2 security"
Skills you'll gain: Computer Security Incident Management, Incident Management, Incident Response, Security Management, Threat Management, Event Monitoring, Security Information and Event Management (SIEM), Enterprise Security, Cyber Operations, Information Technology Operations, Automation
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Information Privacy, Personally Identifiable Information, Regulatory Compliance, Compliance Management, Compliance Training, Data Security, Health Care Procedure and Regulation, Data Governance, Incident Response
University of Michigan
Skills you'll gain: Application Deployment, Django (Web Framework), Object-Relational Mapping, HTML and CSS, Model View Controller, jQuery, Ajax, Hypertext Markup Language (HTML), JSON, SQL, Databases, Application Development, Javascript, Object Oriented Programming (OOP), Web Development, Back-End Web Development, Data Modeling, Application Security, Web Applications, Web Servers
Board Infinity
Skills you'll gain: Vulnerability Assessments, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Cyber Security Assessment, Linux Commands, Cybersecurity, Linux, Network Security, Intrusion Detection and Prevention, Software Installation, Network Analysis
Skills you'll gain: Blockchain, FinTech, Emerging Technologies, Public Key Infrastructure, Cryptography, Payment Systems, Digital Assets, Cryptographic Protocols, Distributed Computing, Stakeholder Management, Information Privacy, Governance, Network Security, Financial Services, Innovation
Columbia University
Skills you'll gain: Portfolio Management, Derivatives, Financial Market, Securities (Finance), Investment Management, Asset Management, Credit Risk, Mortgage Loans, Mathematical Modeling, Applied Mathematics, Capital Markets, Financial Modeling, Securities Trading, Regression Analysis, Market Liquidity, Futures Exchange, Risk Management, Equities, Finance, Market Data
University of Illinois Urbana-Champaign
Skills you'll gain: Distributed Computing, Cloud Infrastructure, Cloud Services, Big Data, Apache Spark, Cloud Computing, Cloud Storage, Cloud Platforms, Network Architecture, Computer Networking, File Systems, Apache Hadoop, Network Infrastructure, Cloud Applications, Infrastructure As A Service (IaaS), General Networking, Software-Defined Networking, Containerization, NoSQL, Operating Systems
University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Network Security, Digital Communications, Authentications, Data Integrity, Algorithms
Skills you'll gain: Django (Web Framework), Web Development, Web Servers, Web Applications, Data Modeling, MySQL, Application Security, Database Development, Object-Relational Mapping, Application Frameworks, Database Management, HTML and CSS, Restful API, Debugging
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Identity and Access Management, Private Cloud, Authorization (Computing), Google Cloud Platform, Cloud-Native Computing, Cloud Security, Network Troubleshooting, Network Security, Network Model, User Accounts, Virtual Private Networks (VPN)
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Infrastructure As A Service (IaaS), Cloud Applications, Cloud Security, Containerization, Data Loss Prevention, Cloud Storage, Network Infrastructure, Security Management, Cloud Computing, Encryption, Virtual Private Networks (VPN), User Provisioning, Data Encryption Standard, Virtual Machines, Application Security
University of Minnesota
Skills you'll gain: Enterprise Resource Planning, Business Systems Analysis, Systems Analysis, Requirements Analysis, Cybersecurity, Business Requirements, Business Systems, Cyber Threat Intelligence, Cloud Computing, Cloud Services, IT Management, Change Management, Business Technologies, Organizational Change, Technology Strategies, System Implementation, User Requirements Documents, Information Technology, Portfolio Management, Governance
In summary, here are 10 of our most popular ec2 security courses
- SOAR for Enterprise Security: Codio
- Privacy Law and Data Protection: University of Pennsylvania
- Django for Everybody: University of Michigan
- Kali Linux: Board Infinity
- Introduction to Blockchain Technologies: INSEAD
- Financial Engineering and Risk Management: Columbia University
- Cloud Computing: University of Illinois Urbana-Champaign
- Cryptography: University of Maryland, College Park
- Django Web Framework : Meta
- Hands-On Labs in Google Cloud for Security Engineers: Google Cloud