Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "configure security groups"
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Information Systems Security, Computer Security Awareness Training, Risk Management, Vulnerability Assessments, Enterprise Security, Cyber Security Assessment
Microsoft
Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Security Controls, Threat Detection, Malware Protection, Application Performance Management, Event Monitoring, Incident Response, Incident Management, Virtual Machines, Anomaly Detection, Query Languages
University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Usability Testing, Interaction Design, Human Factors, Information Privacy, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, Human Centered Design, Data Sharing, Design
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Identity and Access Management, Business Risk Management, Security Controls
Skills you'll gain: Secure Coding, Application Security, Authorization (Computing), Authentications, Data Validation, Role-Based Access Control (RBAC), Verification And Validation, Security Controls, User Accounts, Configuration Management, Package and Software Management, Identity and Access Management, Code Review, Software Installation, Data Integrity
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Cryptography, Security Engineering, Threat Modeling, Authorization (Computing), Encryption, Email Security, Data Integrity, Authentications, Verification And Validation
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Virtual Private Networks (VPN), Threat Detection, Remote Access Systems, Network Monitoring, Firewall, Network Security, Intrusion Detection and Prevention, System Configuration, Security Management, Network Troubleshooting, Network Administration, Servers, System Monitoring, IT Automation, Proxy Servers, Cybersecurity, Cloud Security, Cloud Management, Application Programming Interface (API)
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Endpoint Security, Threat Detection, Incident Response
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Peripheral Devices, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Cybersecurity, Configuration Management, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Security Awareness, Cloud Platforms
Skills you'll gain: Open Web Application Security Project (OWASP), Security Controls, Risk Management, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, NIST 800-53, Cyber Security Policies, Cyber Risk, Safety Audits, Threat Detection, Compliance Auditing
In summary, here are 10 of our most popular configure security groups courses
- Cybersecurity for Business:Â University of Colorado System
- Manage Security Operations:Â Microsoft
- Usable Security:Â University of Maryland, College Park
- Tools for Security Specialists:Â Codio
- Laravel: Configure, Validate, Authenticate and Authorize:Â Infosec
- Design and Analyze Secure Networked Systems:Â University of Colorado System
- Operating Systems: Overview, Administration, and Security:Â IBM
- Computer Networks and Network Security:Â IBM
- Check Point Jump Start: SMB Network Security:Â Check Point Software Technologies Ltd.
- Cybersecurity Solutions and Microsoft Defender:Â Microsoft