Filter by
The language used throughout the course, in both instruction and assessments.
Results for "verification+techniques"
- Status: Free
Skills you'll gain: Verification And Validation, Computational Logic, System Requirements, Functional Requirement, Systems Design, Data Modeling
Johns Hopkins University
Skills you'll gain: Unsupervised Learning, Applied Machine Learning, Dimensionality Reduction, Reinforcement Learning, Regression Analysis, Machine Learning, Data Mining, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning Algorithms, Statistical Machine Learning, Predictive Modeling, Random Forest Algorithm, Decision Tree Learning, Supervised Learning, Exploratory Data Analysis
L&T EduTech
Skills you'll gain: Construction Management, Equipment Design, Construction Engineering, Construction Estimating, Maintenance, Repair, and Facility Services, Product Lifecycle Management, Cost Estimation, Architecture and Construction, Structural Engineering, Commercial Construction, Plant Operations and Management, Mechanical Engineering, Civil Engineering, Manufacturing and Production, Engineering Practices, Digital Transformation, Structural Analysis, Engineering Calculations, Engineering Drawings, Hydraulics
Skills you'll gain: Mobile Security, Open Web Application Security Project (OWASP), Network Security, Wireless Networks, Cryptography, Encryption, Penetration Testing, Application Security, Intrusion Detection and Prevention, Web Applications, Vulnerability Assessments, Infrastructure Security, Threat Detection, Internet Of Things, Cloud Security
- Status: Free
Skills you'll gain: Systems Analysis, Verification And Validation, Computational Logic, Data Modeling, Programming Principles, Software Design, Software Architecture, Theoretical Computer Science, Network Protocols, Algorithms
EIT Digital
Skills you'll gain: Computational Logic, Theoretical Computer Science, Systems Analysis, Verification And Validation, Algorithms, Data Structures
Skills you'll gain: Network Security, Public Key Infrastructure, Network Administration, Cybersecurity, Firewall, Cyber Attacks, Virtual Private Networks (VPN), Cryptography, Threat Modeling, Security Controls, Intrusion Detection and Prevention, Network Monitoring, Network Architecture, Virtual Local Area Network (VLAN), Encryption, Authentications, Human Factors (Security)
Skills you'll gain: Secure Coding, Application Security, Authorization (Computing), Authentications, Data Validation, Role-Based Access Control (RBAC), Verification And Validation, Security Controls, User Accounts, Configuration Management, Package and Software Management, Identity and Access Management, Code Review, Software Installation, Data Integrity
Skills you'll gain: Data Structures, Generative AI, Test Driven Development (TDD), Integration Testing, Unit Testing, Python Programming, Object Oriented Programming (OOP), Cloud Applications, Serverless Computing, Cloud Computing, Microsoft Azure, Algorithms, Software Documentation, Software Development Tools, Maintainability, Code Review, Program Development, Software Development, Technical Documentation, Application Deployment
Skills you'll gain: Overcoming Objections, Sales Strategy, Sales Process, Consultative Selling, Sales, Closing (Sales), Solution Selling, B2B Sales, Data-Driven Decision-Making, Value Propositions, Competitive Analysis, Relationship Building
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Assessments, Infrastructure Security, Distributed Denial-Of-Service (DDoS) Attacks, Application Security, Cloud Security, Network Security, Internet Of Things, Wireless Networks, Application Programming Interface (API), Business Logic
Skills you'll gain: Remote Access Systems, Security Management, Computer Security Incident Management, Data Security, Cybersecurity, Security Controls, Security Strategy, Incident Response, Continuous Monitoring, End User Training and Support, Human Factors (Security), Security Awareness, General Data Protection Regulation (GDPR), System Implementation
In summary, here are 10 of our most popular verification+techniques courses
- System Validation (3): Requirements by modal formulas: EIT Digital
- Advanced Methods in Machine Learning Applications: Johns Hopkins University
- Construction Techniques and Practices: L&T EduTech
- Advanced Network Attacks, Web Hacking, and Cryptography: Packt
- System Validation (4): Modelling Software, Protocols, and other behaviour: EIT Digital
- Automated Reasoning: Symbolic Model Checking: EIT Digital
- Fundamentals of Network Security and Cryptography: Packt
- Laravel: Configure, Validate, Authenticate and Authorize: Infosec
- Advanced Python Development Techniques: Microsoft
- Sales Strategies and Techniques: Packt