Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "securing applications"
DeepLearning.AI
Skills you'll gain: Computer Vision, Deep Learning, Image Analysis, Natural Language Processing, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Tensorflow, Supervised Learning, Keras (Neural Network Library), Artificial Intelligence, Applied Machine Learning, PyTorch (Machine Learning Library), Machine Learning, Debugging, Performance Tuning, Machine Learning Methods, Python Programming, Data-Driven Decision-Making, Text Mining, Network Architecture
- Status: [object Object]
Skills you'll gain: Istio, Node.JS, Software Development Life Cycle, Unit Testing, Cloud Computing Architecture, Server Side, Application Deployment, Kubernetes, React Redux, Cloud Services, Django (Web Framework), Object-Relational Mapping, OpenShift, Git (Version Control System), Full-Stack Web Development, HTML and CSS, Cloud Computing, Jupyter, Generative AI, Interviewing Skills
DeepLearning.AI
Skills you'll gain: Deep Learning, Artificial Neural Networks, Tensorflow, Supervised Learning, Keras (Neural Network Library), Artificial Intelligence, Machine Learning, Python Programming, NumPy, Performance Tuning
Skills you'll gain: Artificial Intelligence, Generative AI, Data Ethics, OpenAI, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Artificial Neural Networks, ChatGPT, Governance, Machine Learning, Business Transformation, Ethical Standards And Conduct, Computer Vision, Emerging Technologies, Natural Language Processing
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, NIST 800-53, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
Skills you'll gain: Computer Hardware, Technical Support, Software Installation, Help Desk Support, Information Technology, Hardware Troubleshooting, Microsoft Windows, Linux, Computer Networking, Computational Logic, Technical Documentation
Skills you'll gain: Open Web Application Security Project (OWASP), Istio, Software Development Life Cycle, Linux Commands, Unit Testing, Application Deployment, Kubernetes, NoSQL, Bash (Scripting Language), MongoDB, Shell Script, Django (Web Framework), Object-Relational Mapping, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Jupyter, Grafana
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Infrastructure As A Service (IaaS), Cloud Applications, Kubernetes, Identity and Access Management, Cloud Computing, Cloud Storage, Network Infrastructure, Containerization, Virtual Machines, Generative AI, Platform As A Service (PaaS), Serverless Computing, Load Balancing, Relational Databases, Scalability
Skills you'll gain: SQL, Databases, Stored Procedure, Relational Databases, Database Design, Query Languages, Database Management, Data Analysis, Jupyter, Data Manipulation, Pandas (Python Package), Transaction Processing
Skills you'll gain: Generative AI, ChatGPT, OpenAI, Artificial Intelligence, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Augmented and Virtual Reality (AR/VR), Deep Learning
Skills you'll gain: Cloud Infrastructure, Kubernetes, Google Cloud Platform, Identity and Access Management, Infrastructure As A Service (IaaS), Containerization, Cloud Applications, Cloud Management, Load Balancing, Cloud Engineering, Infrastructure as Code (IaC), Virtual Machines, Cloud Computing Architecture, Cloud Computing, Cloud Storage, Data Storage, Application Deployment, Docker (Software), Network Infrastructure, Cloud Services
University of Michigan
Skills you'll gain: Web Scraping, Data Processing, Relational Databases, JSON, Database Design, SQL, Network Protocols, Databases, Web Services, Restful API, Programming Principles, Data Cleansing, Data Structures, Data Storytelling, Data Collection, Computer Programming, Python Programming, Data Manipulation, Development Environment, Computational Thinking
Searches related to securing applications
In summary, here are 10 of our most popular securing applications courses
- Deep Learning:Â DeepLearning.AI
- IBM Full Stack Software Developer:Â IBM
- Neural Networks and Deep Learning:Â DeepLearning.AI
- Introduction to Artificial Intelligence (AI):Â IBM
- Assets, Threats, and Vulnerabilities:Â Google
- Technical Support Fundamentals:Â Google
- IBM Back-End Development:Â IBM
- Google Cloud Fundamentals: Core Infrastructure:Â Google Cloud
- Databases and SQL for Data Science with Python:Â IBM
- Generative AI: Introduction and Applications:Â IBM