Filter by
The language used throughout the course, in both instruction and assessments.
Results for "verification+techniques"
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Computer Security, Security Controls, Vulnerability Assessments, Identity and Access Management
HubSpot Academy
Skills you'll gain: Closing (Sales), Booking (Sales), Overcoming Objections, Sales Process, Selling Techniques, Sales Prospecting, HubSpot CRM, Sales, Inside Sales, Prospecting and Qualification, Sales Strategy, Customer Relationship Management (CRM) Software, Customer Relationship Management, Lead Generation, Negotiation, Business Writing, LinkedIn, Value Propositions, Professional Networking, Relationship Building
Skills you'll gain: Manufacturing Processes, Automation, Internet Of Things, Manufacturing Standards, Quality Assurance, Manufacturing Operations, Production Process, Process Control, Engineering Practices, Product Testing
Infosec
Skills you'll gain: Criminal Investigation and Forensics, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, Data Ethics, General Networking, Record Keeping, Data Integrity, File Management, Ethical Standards And Conduct, Encryption, Technical Writing, Linux Commands
University of Maryland, College Park
Skills you'll gain: Interviewing Skills, Negotiation, Telephone Skills, Personal Attributes, Recruitment, Communication, Compensation Strategy, Verbal Communication Skills, Interpersonal Communications, Professionalism, Active Listening, Problem Solving, Personal Development, Self-Awareness, Analytical Skills
Skills you'll gain: SAS (Software), Perl (Programming Language), Data Processing, Statistical Programming, Stored Procedure, Data Manipulation, Data Transformation, Data Analysis
Johns Hopkins University
Skills you'll gain: Integral Calculus, Numerical Analysis, Calculus, Probability, Applied Mathematics, Advanced Mathematics, Geometry, Graphing
University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Key Management, Algorithms
Board Infinity
Skills you'll gain: HR Tech, Human Resources, Human Resource Strategy, Leadership Studies, Workforce Development, Training and Development, Lifelong Learning, Talent Management, Professional Networking, Innovation, Ethical Standards And Conduct, Change Management, Analysis, Branding
Board Infinity
Skills you'll gain: Test Case, Software Testing, Integration Testing, Software Development Life Cycle, System Testing, Acceptance Testing, Maintainability, Regression Testing, Test Planning, Software Quality Assurance, Functional Testing, Usability Testing
In summary, here are 10 of our most popular verification+techniques courses
- Security Concepts and Practices: ISC2
- Detecting and Mitigating Cyber Threats and Attacks: University of Colorado System
- Advanced Cybersecurity Concepts and Capstone Project: Microsoft
- Sales Training: Techniques for a Human-Centric Sales Process: HubSpot Academy
- Welding Processes in Heavy Manufacturing & Quality Controls: L&T EduTech
- Digital Forensics Concepts: Infosec
- Advanced Interviewing Techniques: University of Maryland, College Park
- Advanced SAS Programming Techniques: SAS
- Calculus through Data & Modelling: Techniques of Integration: Johns Hopkins University
- Symmetric Cryptography: University of Colorado System