Filter by
The language used throughout the course, in both instruction and assessments.
Results for "endpoint+protection"
Skills you'll gain: Cryptography, Security Requirements Analysis, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Threat Modeling, Simple Object Access Protocol (SOAP), TCP/IP, Web Applications, Restful API
New York University
Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Zero Trust Network Access, Application Deployment, Network Protocols, Identity and Access Management, Software Installation, Infrastructure Architecture, Solution Architecture, Linux
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Threat Management, Cloud Security, Threat Detection, Application Security, Continuous Monitoring, Cybersecurity, Security Controls, Data Security, Personally Identifiable Information, Identity and Access Management, Cloud Services, Automation
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
New York University
Skills you'll gain: Cyber Attacks, Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cybersecurity, IT Security Architecture, Cloud Security, NIST 800-53, Cyber Threat Intelligence, Hybrid Cloud Computing, Cloud Computing Architecture, Payment Card Industry (PCI) Data Security Standards, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Data Integrity
Skills you'll gain: Amazon S3, Amazon CloudWatch, Amazon Web Services, AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Elastic Compute Cloud, Amazon DynamoDB, Amazon Redshift, Cloud Computing, Cloud Computing Architecture, Cloud Infrastructure, Cloud Management, Data Migration, Command-Line Interface, Cloud Storage, Cloud Security, Database Design, AWS CloudFormation, Infrastructure As A Service (IaaS), Virtual Machines
Alibaba Cloud Academy
Skills you'll gain: Cloud Security, Network Security, General Networking, Network Architecture, Data Security, Application Security, Cloud Computing, Operating Systems, Cloud Platforms, Linux, Information Systems Security, Microsoft Windows, Distributed Denial-Of-Service (DDoS) Attacks, Encryption
Coursera Project Network
Skills you'll gain: Dynamic Host Configuration Protocol (DHCP), Network Security, Virtual Local Area Network (VLAN), Network Planning And Design, Network Architecture, Network Routers, Infrastructure Security, Authentications, Network Switches, Computer Networking
Skills you'll gain: Intrusion Detection and Prevention, Continuous Monitoring, Threat Management, Firewall, Incident Response, Network Security, Threat Detection, Network Monitoring, Infrastructure Security, Real Time Data
Skills you'll gain: Security Information and Event Management (SIEM), System Configuration, Microsoft Azure, System Monitoring, Security Management, Threat Detection, Automation, Cloud Solutions, Incident Management, Query Languages
Microsoft
Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, ASP.NET, Data Security, Back-End Web Development, Authorization (Computing), Application Security, JSON, Identity and Access Management, Data Storage, Application Programming Interface (API), Encryption
In summary, here are 10 of our most popular endpoint+protection courses
- Web Connectivity and Security in Embedded Systems: EIT Digital
- Real-Time Cyber Threat Detection and Mitigation: New York University
- Check Point Jump Start: Harmony Endpoint Security: Check Point Software Technologies Ltd.
- Mitigating Security Vulnerabilities on GC - Português: Google Cloud
- Cyber Attack Countermeasures: New York University
- Enterprise and Infrastructure Security: New York University
- Mastering Cloud: Security, Optimization & Migration on AWS: Edureka
- Protecting Cloud Architecture with Alibaba Cloud: Alibaba Cloud Academy
- How to Secure your Network Device using Cisco Packet Tracer : Coursera Project Network
- Next-Generation Firewalls and Intrusion Prevention: LearnQuest