Filter by
The language used throughout the course, in both instruction and assessments.
Results for "authorization"
Skills you'll gain: Pharmacy, Pharmaceuticals, Health Care Procedure and Regulation, Healthcare Industry Knowledge, Infectious Diseases, Health Care, Emergency Response, Law, Regulation, and Compliance, Medical Science and Research, Medication Administration, Personally Identifiable Information, Regulatory Compliance, Information Privacy, Record Keeping, Risk Analysis
Skills you'll gain: Computer Security Incident Management, Incident Management, Incident Response, Security Management, Threat Management, Event Monitoring, Security Information and Event Management (SIEM), Enterprise Security, Cyber Operations, Information Technology Operations, Automation
Skills you'll gain: Medical Office Procedures, Medical Records, Health Information Management and Medical Records, Conflict Management, Electronic Medical Record, Patient Registration, Patient Coordination, Office Administration, Cultural Responsiveness, Cultural Diversity, Cultural Sensitivity, Professionalism, Record Keeping, Patient Education and Support, Professional Development, Administrative Support and Clerical Tasks, Office Management, Administrative Support, Health Care Procedure and Regulation, Time Management
Skills you'll gain: MITRE ATT&CK Framework, Network Security, Cybersecurity, Cyber Operations, Python Programming, Data Access, Authorization (Computing), Authentications, Scripting, Scripting Languages, Computer Programming, User Accounts
University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geospatial Information and Technology, Encryption, Data Security, Network Security, Information Systems Security, Public Key Infrastructure, Wireless Networks, Extensible Languages and XML
University of Pennsylvania
Skills you'll gain: Health Care Procedure and Regulation, Health Systems, Healthcare Industry Knowledge, Medicare, Health Care Administration, Law, Regulation, and Compliance, Regulation and Legal Compliance, Policy Analysis, Emergency Departments, Ethical Standards And Conduct
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Application Security, Cryptography, Data Storage
University of Illinois Urbana-Champaign
Skills you'll gain: Distributed Computing, File Systems, Cloud Computing, Transaction Processing, Network Security, Data Centers, Authorization (Computing), Apache Hadoop, Data Store, Authentications, Scalability, NoSQL, Algorithms, Encryption, Graph Theory
University of Colorado System
Skills you'll gain: Linux Administration, Linux, Linux Servers, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Server Administration, Authorization (Computing), Network Administration, Information Systems Security, Authentications
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Personally Identifiable Information, Law, Regulation, and Compliance, Information Privacy, Compliance Management, Health Care Procedure and Regulation, Data Security, Incident Response, Risk Analysis, Governance
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Data Security, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
Searches related to authorization
In summary, here are 10 of our most popular authorization courses
- Pharmacy Law, Emergency Preparedness, and Biopharmaceutics: MedCerts
- SOAR for Enterprise Security: Codio
- Medical Office Procedures and Administration Fundamentals: MedCerts
- Credential Access, discovery, lateral movement & collection: Infosec
- Advanced System Security Topics: University of Colorado System
- U.S. Health Law Fundamentals: University of Pennsylvania
- Advanced System Security Design: University of Colorado System
- Networking and Security in iOS Applications: University of California, Irvine
- Cloud Computing Concepts: Part 2: University of Illinois Urbana-Champaign
- Linux Server Management and Security: University of Colorado System