Filter by
The language used throughout the course, in both instruction and assessments.
Results for "verification+techniques"
Skills you'll gain: Identity and Access Management, Cryptography, Encryption, Risk Management Framework, Information Systems Security, Threat Management, Cybersecurity, Authentications, Data Security, Personally Identifiable Information, Security Controls, User Accounts, Information Privacy, Infrastructure Security, Multi-Factor Authentication, Authorization (Computing)
Skills you'll gain: Systems Development, Data Migration, Software Development Life Cycle, Governance, Change Management, Software Testing, Project Management, Risk Management, Data Integrity, Verification And Validation, System Implementation, Software Development Methodologies, Auditing, Project Management Office (PMO), Software Development Tools, Agile Methodology, Feasibility Studies
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Security Testing, Cyber Security Assessment, Technical Communication, Technical Writing, Scripting, Application Security, Programming Principles, Automation
Board Infinity
Skills you'll gain: Blockchain, Cryptographic Protocols, Cryptography, Encryption, Transaction Processing, Authentications, Public Key Infrastructure, Information Privacy, Data Security, Emerging Technologies, Data Integrity, Algorithms
- Status: Free
Coursera Project Network
Skills you'll gain: Data Validation, Data Cleansing, Alteryx, Data Quality, Microsoft Excel, Data Integrity, Data Integration, Test Tools
Skills you'll gain: Endpoint Security, Multi-Factor Authentication, Patch Management, Network Security, Information Systems Security, Cybersecurity, Network Monitoring, Data Security, Authentications, Malware Protection, Mobile Security, Continuous Monitoring, Authorization (Computing), Identity and Access Management
Northeastern University
Skills you'll gain: Data Mining, Exploratory Data Analysis, Dimensionality Reduction, Data Cleansing, Data Transformation, Text Mining, Data-Driven Decision-Making, Predictive Analytics, Forecasting, Big Data, Data Analysis, Classification And Regression Tree (CART), Supervised Learning, Statistical Analysis, Performance Testing, Data Visualization Software, Unsupervised Learning, Machine Learning, Regression Analysis
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Application Deployment, Software Installation, Patch Management, Package and Software Management
Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Application Security, Information Systems Security, Data Security, Cryptography, Endpoint Security, OSI Models, Encryption, Wireless Networks, Malware Protection, Public Key Infrastructure, Mobile Security, Network Protocols, Virtualization
Skills you'll gain: Hardening, Public Key Infrastructure, Security Engineering, Cryptographic Protocols, Information Systems Security, Infrastructure Security, Network Security, Cybersecurity, Cloud Security, System Configuration, Cryptography, Encryption, Key Management, Enterprise Security, Mobile Security
Skills you'll gain: Hardware Troubleshooting, Information Systems Security, Malware Protection, Firewall, Security Controls, Data Security, Computer Security Awareness Training, Network Security, Cybersecurity, Technical Support, Encryption, Problem Management, Authorization (Computing), Data Integrity, Authentications
Skills you'll gain: Identity and Access Management, Threat Detection, Encryption, Cybersecurity, Cyber Threat Intelligence, Intrusion Detection and Prevention, Cyber Attacks, Infrastructure Security, Network Security, Authorization (Computing), Data Encryption Standard, Email Security, Network Architecture, Operating Systems, Malware Protection, System Monitoring, Anomaly Detection
In summary, here are 10 of our most popular verification+techniques courses
- Security Fundamentals and Identity Management: Packt
- Systems Acquisition, Development and Implementation: Packt
- Reporting and Advanced Practices: Packt
- Deep Dive into Cryptography: Board Infinity
- Data Validation with Alteryx: Testing and Optimization Tools: Coursera Project Network
- Comprehensive Cisco Security Techniques and Automation: Packt
- Practical Engineering Data Mining: Techniques and Uses: Northeastern University
- Check Point Jump Start: Product Deployment: Check Point Software Technologies Ltd.
- Cryptography, Network Security, and Application Security: Packt
- Security Engineering and Cryptography: Packt