Filter by
The language used throughout the course, in both instruction and assessments.
Results for "iam+security+design"
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Role-Based Access Control (RBAC), Containerization
Skills you'll gain: Identity and Access Management, Endpoint Security, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Data Security, Cyber Security Strategy, Secure Coding, Firewall, Application Security, Authentications, Security Controls, Authorization (Computing), Security Information and Event Management (SIEM), Data Governance, Incident Response
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Identity and Access Management, Private Cloud, Authorization (Computing), Google Cloud Platform, Cloud-Native Computing, Cloud Security, Network Troubleshooting, Network Security, Network Model, User Accounts, Virtual Private Networks (VPN)
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Computer Security, Security Controls, Vulnerability Assessments, Identity and Access Management
Google Cloud
Skills you'll gain: Identity and Access Management, Role-Based Access Control (RBAC), Google Cloud Platform, Cloud Management, Authorization (Computing)
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Databases, Software Architecture, Secure Coding, Software Design Patterns, Systems Design, Software Engineering, Software Development Tools, Software Development Life Cycle, Technical Design, Security Engineering
Infosec
Skills you'll gain: Security Management, Cyber Governance, IT Management, Cybersecurity, Cyber Security Strategy, Cyber Risk, Cyber Security Policies, Security Strategy, Key Performance Indicators (KPIs), Technical Communication, Risk Management, Corporate Communications, Communication, Change Management
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, ISO/IEC 27001, Computer Security Awareness Training, Cyber Risk, Information Assurance
Skills you'll gain: Cloud Security, Internet Of Things, Network Security, Application Security, Security Engineering, Information Systems Security, Data Security, Secure Coding, Cloud Services, Infrastructure Security, Security Controls, Key Management, Cloud Computing, Time Series Analysis and Forecasting, Application Development, Encryption, Cryptography, Identity and Access Management, Data Integrity, Authentications
Skills you'll gain: Azure Active Directory, Authentications, Microsoft Azure, Authorization (Computing), Network Security, Virtual Private Networks (VPN), Identity and Access Management, Firewall, Cloud Security, User Provisioning, Network Administration, Infrastructure Security, Security Management, Role-Based Access Control (RBAC), Kubernetes, User Accounts, Data Security, Security Information and Event Management (SIEM), Application Security, Virtual Machines
Juniper Networks
Skills you'll gain: Juniper Network Technologies, Network Security, Network Planning And Design, Network Administration, IT Security Architecture, Firewall, System Configuration, Cybersecurity, Command-Line Interface, Configuration Management
In summary, here are 10 of our most popular iam+security+design courses
- Cloud Security Risks: Identify and Protect Against Threats: Google Cloud
- Cybersecurity Architecture: IBM
- Hands-On Labs in Google Cloud for Security Engineers: Google Cloud
- Advanced Cybersecurity Concepts and Capstone Project: Microsoft
- Cloud IAM: Qwik Start: Google Cloud
- Secure Software Design: University of Colorado System
- Management: Infosec
- Advanced System Security Design: University of Colorado System
- Security Management and Governance: Royal Holloway, University of London
- Developing Secure IoT Applications: EDUCBA