Filter by
The language used throughout the course, in both instruction and assessments.
Results for "applying+security+best+practices"
University of California, Irvine
Skills you'll gain: Vendor Management, Security Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Security Controls, Human Factors (Security), Asset Protection, Due Diligence
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection, Data Sharing
University of Colorado System
Skills you'll gain: Disaster Recovery, Business Continuity Planning, Security Management, System Monitoring, System Implementation, Cyber Security Policies, Compliance Auditing, Systems Administration, Governance, Information Systems Security, Unix, Change Management
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Server Side, Vulnerability Assessments
Skills you'll gain: Wide Area Networks, Network Security, Network Administration, Virtual Private Networks (VPN), Network Routing, Computer Networking, Multiprotocol Label Switching, TCP/IP, Firewall, Virtual Local Area Network (VLAN), Dynamic Host Configuration Protocol (DHCP), Network Infrastructure, Intrusion Detection and Prevention, Network Switches, Local Area Networks, Network Protocols, Encryption
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Skills you'll gain: Secure Coding, Application Security, Authorization (Computing), Authentications, Data Validation, Role-Based Access Control (RBAC), Verification And Validation, Security Controls, User Accounts, Configuration Management, Package and Software Management, Identity and Access Management, Code Review, Software Installation, Data Integrity
Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Role-Based Access Control (RBAC), Authorization (Computing), User Accounts, Security Controls, OAuth, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Enterprise Security, Network Security, Network Protocols
Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cryptography, Security Testing, Cybersecurity, Vulnerability Assessments, Encryption, Technical Writing, Cyber Threat Intelligence, Cyber Attacks
Skills you'll gain: Threat Modeling, Vulnerability Assessments, Risk Analysis, Vulnerability Management, Business Continuity, Cyber Security Assessment, Business Risk Management, Risk Mitigation, Risk Management, Incident Response, Security Management, Business Analysis
Skills you'll gain: Vulnerability Management, Cybersecurity, Risk Analysis, Risk Management, Authentications, Network Security, Disaster Recovery, Cloud Security, Incident Response, Security Management, Business Continuity Planning, Application Security, Information Systems Security, Risk Management Framework, Vulnerability Assessments, Threat Modeling, Data Security, Cyber Risk, Identity and Access Management, Security Awareness
Skills you'll gain: Azure Active Directory, Single Sign-On (SSO), Identity and Access Management, Authentications, Authorization (Computing), Active Directory, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), Security Controls, Cloud Services
In summary, here are 10 of our most popular applying+security+best+practices courses
- Personnel & Third-Party Security: University of California, Irvine
- Proactive Computer Security: University of Colorado System
- Planning, Auditing and Maintaining Enterprise Systems: University of Colorado System
- Software Security for Web Applications: Codio
- Network Security and Optimization: Packt
- Cyber Attack Countermeasures: New York University
- Laravel: Configure, Validate, Authenticate and Authorize: Infosec
- Identity and Access Management (IAM): Packt
- Cybersecurity Fundamentals: Johns Hopkins University
- IT Risk Assessment Practices: Packt