Filter by
The language used throughout the course, in both instruction and assessments.
Results for "managing+and+securing+ad+ds+environments"
Microsoft
Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Security Controls, Threat Detection, Malware Protection, Application Performance Management, Event Monitoring, Incident Response, Incident Management, Virtual Machines, Anomaly Detection, Query Languages
Skills you'll gain: API Gateway, Cloud API, Capacity Management, Kubernetes, Application Security, Scalability, Hybrid Cloud Computing, Security Controls, Proxy Servers, Application Deployment, Virtual Environment, Role-Based Access Control (RBAC), Encryption, Network Security, Debugging
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
Skills you'll gain: Splunk, Data Modeling, Role-Based Access Control (RBAC), System Monitoring, Incident Response, User Accounts, Security Information and Event Management (SIEM), Authorization (Computing), Machine Learning, Event Monitoring, Systems Administration, Performance Tuning, Data Visualization, Threat Detection, Identity and Access Management, Exploratory Data Analysis, Anomaly Detection, Continuous Monitoring, Correlation Analysis, Data Analysis
Fortinet, Inc.
Skills you'll gain: Event Monitoring, Network Administration, Security Information and Event Management (SIEM), Threat Management, Systems Administration, Network Security, Security Management, System Monitoring, System Configuration, Cybersecurity, Data Security, Multi-Factor Authentication
ISC2
Skills you'll gain: Authentications, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Security Controls, IT Security Architecture, User Provisioning, Multi-Factor Authentication, User Accounts, Data Security, Application Security, Information Systems Security, Network Security, Information Assurance, Data Integrity, Network Architecture
Fortinet, Inc.
Skills you'll gain: Firewall, Network Security, Virtual Private Networks (VPN), Network Administration, Intrusion Detection and Prevention, Network Infrastructure, Enterprise Security, Network Architecture, Security Controls, System Configuration, Performance Tuning, Hardware Architecture
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Security Strategy, Risk Management Framework, Security Controls, Enterprise Security, Information Privacy
Skills you'll gain: Security Controls, Security Management, Information Systems Security, Information Assurance, Security Awareness, Data Ethics, Cyber Security Policies, Data Security, Information Privacy, Information Management, Change Control, Configuration Management
Skills you'll gain: Endpoint Security, Application Security, Cloud Security, Cyber Attacks, Cybersecurity, Malware Protection, Information Systems Security, Security Awareness, Data Security, Cloud Computing, Network Security, Threat Detection, Encryption, Virtualization, Data Ethics
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Containerization, Encryption
EC-Council
Skills you'll gain: Network Security, Mobile Security, Public Key Infrastructure, Cryptography, Security Controls, Cybersecurity, Authorization (Computing), Authentications, Identity and Access Management, Wireless Networks, Cloud Computing, Cloud Security, Network Monitoring, Data Security, Internet Of Things, Virtualization and Virtual Machines
In summary, here are 10 of our most popular managing+and+securing+ad+ds+environments courses
- Manage Security Operations: Microsoft
- Managing and Securing the Apigee Hybrid API Platform: Google Cloud
- Security Concepts and Practices: ISC2
- Splunk Administration and Advanced Topics: EDUCBA
- FortiAnalyzer Administrator: Fortinet, Inc.
- Access Controls : ISC2
- Enterprise Firewall Administrator: Fortinet, Inc.
- The GRC Approach to Managing Cybersecurity: Kennesaw State University
- Security Operations and Administration: ISC2
- Systems and Application Security: ISC2