Filter by
The language used throughout the course, in both instruction and assessments.
Results for "mobile+security"
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Information Systems Security, Command-Line Interface, Security Controls, Virtual Private Networks (VPN), Hardening, Firewall, Vulnerability Scanning, Local Area Networks, Vulnerability Assessments, Zero Trust Network Access, Wireless Networks, Malware Protection, Threat Detection, Security Information and Event Management (SIEM), Encryption, Network Analysis
Skills you'll gain: Identity and Access Management, Cryptography, Encryption, Risk Management Framework, Information Systems Security, Threat Management, Cybersecurity, Authentications, Data Security, Personally Identifiable Information, Security Controls, User Accounts, Information Privacy, Infrastructure Security, Multi-Factor Authentication, Authorization (Computing)
Skills you'll gain: Mobile Security, Open Web Application Security Project (OWASP), Network Security, Wireless Networks, Cryptography, Encryption, Penetration Testing, Application Security, Intrusion Detection and Prevention, Web Applications, Vulnerability Assessments, Infrastructure Security, Threat Detection, Internet Of Things, Cloud Security
Kennesaw State University
Skills you'll gain: Wireless Networks, Mobile Security, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Computer Networking, Computer Security Awareness Training, Information Privacy, Emerging Technologies
Skills you'll gain: Endpoint Security, Vulnerability Management, Infrastructure as Code (IaC), Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Vulnerability Scanning, Network Architecture, Cloud Computing, Threat Management, Zero Trust Network Access, Cybersecurity, Cyber Attacks, Network Security, Cyber Security Assessment, IT Security Architecture, Threat Detection, Mobile Security, Hardening
Skills you'll gain: Penetration Testing, Web Applications, Open Web Application Security Project (OWASP), Vulnerability Scanning, Security Testing, Vulnerability Assessments, Web Services, Application Security, Application Programming Interface (API), Content Management Systems, Command-Line Interface, Databases
Skills you'll gain: Threat Detection, Threat Management, Cloud Security, Google Cloud Platform, Vulnerability Management, Vulnerability Assessments, Security Information and Event Management (SIEM), Public Cloud
Skills you'll gain: Penetration Testing, Incident Response, Computer Security Incident Management, Cyber Security Strategy, Application Security, Open Web Application Security Project (OWASP), Cybersecurity, Information Systems Security, Vulnerability Assessments, Secure Coding, Intrusion Detection and Prevention, Hardening, Infrastructure Security, Threat Modeling, Mobile Security, Cloud Security, Vulnerability Management, Disaster Recovery, Containerization
Illinois Tech
Skills you'll gain: Cloud Security, Identity and Access Management, AWS Identity and Access Management (IAM), Incident Response, Cloud Computing, Cloud Computing Architecture, Data Security, Application Security, Network Security, Encryption, Role-Based Access Control (RBAC), Amazon Web Services, Key Management, Infrastructure Security, Security Controls, Firewall, Continuous Monitoring, Multi-Factor Authentication
Google Cloud
Skills you'll gain: Vulnerability Scanning, Google App Engine, Security Testing, Application Security, Secure Coding, Cloud Security, Google Cloud Platform
Skills you'll gain: Remote Access Systems, Security Management, Computer Security Incident Management, Data Security, Cybersecurity, Security Controls, Security Strategy, Incident Response, Continuous Monitoring, End User Training and Support, Human Factors (Security), Security Awareness, General Data Protection Regulation (GDPR), System Implementation
Illinois Tech
Skills you'll gain: Cloud Security, AWS Identity and Access Management (IAM), Identity and Access Management, Incident Response, Cloud Computing, Network Security, Cloud Applications, Data Security, Cloud Platforms, Application Security, Encryption, Firewall, Security Controls, Amazon Web Services, Infrastructure Security, Role-Based Access Control (RBAC), Continuous Monitoring, Multi-Factor Authentication
In summary, here are 10 of our most popular mobile+security courses
- Securing Systems and Networks: Packt
- Security Fundamentals and Identity Management: Packt
- Advanced Network Attacks, Web Hacking, and Cryptography: Packt
- Cybersecurity: Protecting your Information on the Go: Kennesaw State University
- Cloud Security, Resiliency, and Vulnerability Management: Packt
- Hands-On Web App Pentesting: Packt
- Detect and Investigate Threats with Security Command Center: Google Cloud
- Advanced Security Strategies and Incident Response: Packt
- Cloud Computing Security - Master's: Illinois Tech
- Cloud Security Scanner: Qwik Start: Google Cloud