Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "ec2 security"
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Data Integrity
Amazon Web Services
Skills you'll gain: Infrastructure as Code (IaC), AWS CloudFormation, CI/CD, DevOps, Continuous Deployment, Application Deployment, Continuous Delivery, Continuous Integration, Amazon Web Services, Infrastructure As A Service (IaaS), Serverless Computing
Skills you'll gain: Secure Coding, Penetration Testing, Application Security, Payment Systems, Continuous Monitoring, Blockchain, Incident Response, Code Review, Vulnerability Assessments, Data Security, Development Testing, Authorization (Computing), Data Validation
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Server Side, Vulnerability Assessments
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Application Specific Integrated Circuits, Cryptography, Encryption, Technical Design, Emerging Technologies, System Design and Implementation
University of California San Diego
Skills you'll gain: Cloud Computing Architecture, Cloud Computing, Amazon Web Services, Cloud Infrastructure, Cloud Services, Internet Of Things, Amazon Elastic Compute Cloud, Software Installation, Embedded Systems, Linux, Machine Learning, Command-Line Interface, Restful API
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cryptography, Cyber Security Assessment, Cyber Risk, Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Security Policies, Infrastructure Security, Security Awareness, Identity and Access Management
Alibaba Cloud Academy
Skills you'll gain: Cloud Security, Network Security, General Networking, Data Security, Application Security, Cloud Computing, Operating Systems, Linux, Information Systems Security, Cybersecurity, Microsoft Windows, Distributed Denial-Of-Service (DDoS) Attacks, Encryption
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Role-Based Access Control (RBAC), Containerization
- Status: Free
Coursera Project Network
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, User Provisioning, Role-Based Access Control (RBAC), Authorization (Computing), User Accounts, Cloud Security, Infrastructure As A Service (IaaS)
LearnQuest
Skills you'll gain: Continuous Monitoring, Cybersecurity, Security Management, Network Security, Security Strategy, Risk Management Framework, Internet Of Things, Cyber Risk, Threat Management, Cyber Security Strategy, Application Security, Infrastructure Security, Hardware Architecture, System Monitoring, Cloud Security, Security Engineering, Security Controls, Encryption, Wireless Networks, Network Protocols
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Linux, Linux Administration, Network Security, Role-Based Access Control (RBAC), Identity and Access Management, Linux Commands, Network Monitoring, System Monitoring, Network Administration, Hardening, Continuous Monitoring, Information Systems Security, Security Controls, Wireless Networks, Firewall, Penetration Testing, Cybersecurity, Threat Detection
In summary, here are 10 of our most popular ec2 security courses
- Introduction to Cyber Attacks:Â New York University
- DevOps on AWS: Release and Deploy:Â Amazon Web Services
- Security and Auditing in Ethereum:Â EDUCBA
- Software Security for Web Applications:Â Codio
- Hardware Security:Â University of Maryland, College Park
- Internet of Things V2: Setting up and Using Cloud Services:Â University of California San Diego
- Cybersecurity and Its Ten Domains:Â Kennesaw State University
- Protecting Cloud Architecture with Alibaba Cloud:Â Alibaba Cloud Academy
- Cloud Security Risks: Identify and Protect Against Threats:Â Google Cloud
- Security with AWS: Identity and Access Management (IAM) :Â Coursera Project Network