Filter by
The language used throughout the course, in both instruction and assessments.
Results for "authentication+and+authorization"
University of Colorado System
Skills you'll gain: Cryptography, Cryptographic Protocols, Encryption, Information Systems Security, Cybersecurity, Computer Security, Theoretical Computer Science
Microsoft
Skills you'll gain: Identity and Access Management, Azure Active Directory, Microsoft Azure, Hybrid Cloud Computing, Network Security, Network Administration, Single Sign-On (SSO), Windows PowerShell, Network Architecture, Virtual Machines, Infrastructure as Code (IaC), Virtualization, Role-Based Access Control (RBAC), Multi-Factor Authentication, Command-Line Interface
Association of International Certified Professional Accountants
Skills you'll gain: Digital Assets, Blockchain, Asset Management, Cryptography, Cybersecurity, Security Awareness, Security Controls, Securities (Finance), Multi-Factor Authentication, Financial Market, Financial Regulations, Accounting
Skills you'll gain: Splunk, Data Modeling, Role-Based Access Control (RBAC), System Monitoring, Incident Response, User Accounts, Security Information and Event Management (SIEM), Authorization (Computing), Machine Learning, Event Monitoring, Systems Administration, Performance Tuning, Data Visualization, Threat Detection, Identity and Access Management, Exploratory Data Analysis, Anomaly Detection, Continuous Monitoring, Correlation Analysis, Data Analysis
Codio
Skills you'll gain: OAuth, Web Development Tools, Authentications, Web Servers, Application Programming Interface (API), Restful API, Servers, JSON, Software Documentation, Web Applications, Web Services, Application Security
Skills you'll gain: Continuous Monitoring, Business Continuity, Security Management, ISO/IEC 27001, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
Skills you'll gain: Cyber Operations, Cybersecurity, Command-Line Interface, Scripting, Python Programming, Data Access, Network Security, System Monitoring, User Accounts, Scripting Languages, System Programming
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, ISO/IEC 27001, Computer Security Awareness Training, Cyber Risk, Information Assurance
University of California, Irvine
Skills you'll gain: Vendor Management, Security Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Security Controls, Human Factors (Security), Asset Protection, Due Diligence
Microsoft
Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, ASP.NET, Data Security, Back-End Web Development, Authorization (Computing), Application Security, JSON, Identity and Access Management, Data Storage, Application Programming Interface (API), Encryption
- Status: Free
Coursera Instructor Network
Skills you'll gain: Information Privacy, General Data Protection Regulation (GDPR), Personally Identifiable Information, Data Security, Data Governance, Data Ethics, Law, Regulation, and Compliance, Data Loss Prevention, Data Management, Security Controls, Regulatory Compliance, Compliance Management, Compliance Training, Data Sharing, Security Strategy, Regulatory Requirements, Data Processing, Risk Management, Employee Training, Risk Analysis
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Containerization, Encryption
Searches related to authentication+and+authorization
In summary, here are 10 of our most popular authentication+and+authorization courses
- Cryptography and Information Theory: University of Colorado System
- Azure Identity and Networking Essentials: Microsoft
- Understanding, Using, and Securing Crypto and Digital Assets: Association of International Certified Professional Accountants
- Splunk Administration and Advanced Topics: EDUCBA
- API Development: Codio
- Security and Risk Management: Packt
- Establishing Command-and-Control and Finding Credentials: Infosec
- Security Management and Governance: Royal Holloway, University of London
- Personnel & Third-Party Security: University of California, Irvine
- Security and Authentication: Microsoft