Filter by
The language used throughout the course, in both instruction and assessments.
Results for "sd-branch+security"
Skills you'll gain: IT Security Architecture, Network Security, Infrastructure Security, Software-Defined Networking, Application Security, Zero Trust Network Access, Network Architecture, Threat Modeling, Cyber Security Assessment, Cybersecurity, Secure Coding, Cloud Security, DevSecOps, Scenario Testing, Cryptography, Enterprise Security, Vulnerability Assessments, Identity and Access Management
Skills you'll gain: Amazon Web Services, Cloud Security, Infrastructure Security, Network Security, Application Security, Endpoint Security, AWS Identity and Access Management (IAM), Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Amazon Elastic Compute Cloud, Virtual Private Networks (VPN)
Skills you'll gain: Incident Response, Key Management, Amazon Web Services, Computer Security Incident Management, AWS Identity and Access Management (IAM), Amazon CloudWatch, Encryption, Cloud Security, Event Monitoring, Continuous Monitoring, Security Controls, Security Information and Event Management (SIEM), Data Security, Data Encryption Standard, Amazon Elastic Compute Cloud, Amazon S3, System Monitoring
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Cloud Security, Security Assertion Markup Language (SAML), Security Management, Amazon CloudWatch, Security Information and Event Management (SIEM), Incident Response, Amazon Elastic Compute Cloud, Infrastructure Security, Amazon S3, Continuous Monitoring, Data Access, Automation, Configuration Management
Skills you'll gain: Azure DevOps, CI/CD, Continuous Delivery, Test Planning, Continuous Integration, DevOps, Git (Version Control System), GitHub, Agile Methodology, YAML, Application Deployment, Version Control, Development Testing, Sprint Planning, Scrum (Software Development)
Skills you'll gain: Identity and Access Management, Threat Detection, Encryption, Cybersecurity, Cyber Threat Intelligence, Intrusion Detection and Prevention, Cyber Attacks, Infrastructure Security, Network Security, Authorization (Computing), Data Encryption Standard, Email Security, Network Architecture, Operating Systems, Malware Protection, System Monitoring, Anomaly Detection