Filter by
The language used throughout the course, in both instruction and assessments.
Results for "database+vulnerabilities"
Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Cyber Threat Intelligence, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Risk Management, Security Awareness, Information Systems Security, Cyber Operations, Cyber Security Policies, Incident Response, Computer Security Incident Management, Network Security, Risk Analysis
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Cloud Applications, Application Security, Secure Coding, DevSecOps, Cloud Computing, Identity and Access Management, Multi-Factor Authentication, Threat Modeling, Cryptography, Security Controls, Web Services
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Application Security, Vulnerability Assessments, Vulnerability Management, Extensible Markup Language (XML), Scripting, Cybersecurity
Skills you'll gain: Cybersecurity, Cyber Operations, Cyber Threat Hunting, Intrusion Detection and Prevention, Scripting, Python Programming, Unix Commands, Command-Line Interface, Microsoft Windows, User Accounts
Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Security Engineering, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Risk Management Framework, Threat Detection, Vulnerability Assessments, Incident Response
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, Security Engineering, C++ (Programming Language), User Accounts, Data Validation, Debugging, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
Skills you'll gain: Cloud Security, Microsoft Azure, Threat Management, Security Controls, Cloud Management, Security Information and Event Management (SIEM), Data Security, Key Management, Continuous Monitoring, Cloud Services, Network Security, Threat Detection, Virtual Environment, Query Languages, Event Monitoring
University of Colorado Boulder
Skills you'll gain: Data Security, Cybersecurity, Cyber Attacks, Data Ethics, Authentications, Information Assurance, Authorization (Computing), Cryptography, Human Factors (Security), Security Controls, Security Awareness, Information Privacy, Data Access, Threat Modeling, Encryption
Google Cloud
Skills you'll gain: Cloud Security, PostgreSQL, Google Cloud Platform, Authentications, Database Management, Data Security, Identity and Access Management, Key Management
University of Minnesota
Skills you'll gain: Cloud Security, Data Security, Cloud Services, Cloud Storage, Personally Identifiable Information, General Data Protection Regulation (GDPR), Information Privacy, Data Governance, Data Integrity, Security Controls, Relational Databases, Encryption, SQL
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cybersecurity, Cyber Attacks, Threat Modeling, Risk Analysis, Application Security, Vulnerability Assessments, Network Security, Threat Detection, Data Security, Artificial Intelligence, Risk Mitigation, Generative AI, Natural Language Processing
Microsoft
Skills you'll gain: Data Security, Cloud Security, Azure Active Directory, Microsoft Azure, Data Storage, Encryption, Cloud Storage, Personally Identifiable Information, Authorization (Computing), Data Access, Authentications, Database Management, Data Governance, Key Management, Role-Based Access Control (RBAC), Firewall
Searches related to database+vulnerabilities
In summary, here are 10 of our most popular database+vulnerabilities courses
- Cybersecurity Foundations for Risk Management: Kennesaw State University
- Cloud Application Security: University of Minnesota
- Previous OWASP Risks: Infosec
- Execution, persistence, privilege escalation and evasion: Infosec
- Introduction to Automotive Cybersecurity & Vehicle Networks: Starweaver
- Identifying Security Vulnerabilities in C/C++Programming: University of California, Davis
- Microsoft Defender Cloud Compliance - Secure Azure Services: Microsoft
- Cybersecurity for Data Science: University of Colorado Boulder
- Securing a Cloud SQL for PostgreSQL Instance: Google Cloud
- Cloud Data Security: University of Minnesota