Filter by
The language used throughout the course, in both instruction and assessments.
Results for "backup+and+security+configuration"
University of Colorado System
Skills you'll gain: Disaster Recovery, Business Continuity Planning, Security Management, System Monitoring, System Implementation, Cyber Security Policies, Compliance Auditing, Systems Administration, Governance, Information Systems Security, Unix, Change Management
Fortinet, Inc.
Skills you'll gain: Firewall, Network Security, Virtual Private Networks (VPN), Network Administration, Intrusion Detection and Prevention, Network Infrastructure, Enterprise Security, Network Architecture, Security Controls, System Configuration, Performance Tuning, Hardware Architecture
University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geospatial Information and Technology, Encryption, Data Security, Network Security, Information Systems Security, Public Key Infrastructure, Wireless Networks, Extensible Languages and XML
Skills you'll gain: Security Controls, Security Management, Information Systems Security, Information Assurance, Security Awareness, Data Ethics, Cyber Security Policies, Data Security, Information Privacy, Information Management, Change Control, Configuration Management
Skills you'll gain: Disaster Recovery, Microsoft Azure, System Monitoring, Cloud Security, Continuous Monitoring, Systems Administration, IT Infrastructure, Cloud Storage, Patch Management, Virtual Machines, Cloud Computing, Cyber Security Policies, File Management, Cloud Services, Data Security, Data Storage
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Identity and Access Management, Business Risk Management, Security Controls
Coursera Project Network
Skills you'll gain: Microsoft Azure, Virtual Machines, Data Storage Technologies, Cloud Storage, Cloud Computing, Disaster Recovery, Cloud Services
Whizlabs
Skills you'll gain: Microsoft Azure, System Monitoring, Network Monitoring, Application Performance Management, Cloud Management, Cloud Infrastructure, Cloud Storage, Virtual Machines, Cloud Computing, Event Monitoring, Disaster Recovery, Data Maintenance, Data Storage, Query Languages
Kennesaw State University
Skills you'll gain: Network Security, Security Management, Firewall, Cyber Attacks, Network Monitoring, Cybersecurity, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, Continuous Monitoring, TCP/IP, Intrusion Detection and Prevention, Threat Detection, Mobile Security, Cryptography, Encryption
Microsoft
Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Security Controls, Threat Detection, Malware Protection, Application Performance Management, Event Monitoring, Incident Response, Incident Management, Virtual Machines, Anomaly Detection, Query Languages
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Data Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Cloud Computing
Skills you'll gain: Splunk, Data Modeling, Role-Based Access Control (RBAC), System Monitoring, Incident Response, User Accounts, Security Information and Event Management (SIEM), Authorization (Computing), Machine Learning, Event Monitoring, Systems Administration, Performance Tuning, Data Visualization, Threat Detection, Identity and Access Management, Exploratory Data Analysis, Anomaly Detection, Continuous Monitoring, Correlation Analysis, Data Analysis
In summary, here are 10 of our most popular backup+and+security+configuration courses
- Planning, Auditing and Maintaining Enterprise Systems: University of Colorado System
- Enterprise Firewall Administrator: Fortinet, Inc.
- Advanced System Security Topics: University of Colorado System
- Security Operations and Administration: ISC2
- Azure Backup, Security, and Compliance Administration: Microsoft
- Tools for Security Specialists: Codio
- Implementing Microsoft Azure Backup: Coursera Project Network
- Monitoring and Backup in Azure : Whizlabs
- Managing Network Security: Kennesaw State University
- Manage Security Operations: Microsoft