Filter by
The language used throughout the course, in both instruction and assessments.
Results for "backup+and+recovery+strategies"
Skills you'll gain: Systems Administration, Cloud Infrastructure, IT Infrastructure, Lightweight Directory Access Protocols, Active Directory, Disaster Recovery, Server Administration, Linux Administration, Cloud Computing, Servers, Network Administration, Windows Servers, Data Storage, Virtualization, User Accounts
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Threat Management, System Monitoring, Automation
Infosec
Skills you'll gain: File Systems, Criminal Investigation and Forensics, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Data Security, Digital Communications, File Management, Network Security, Operating Systems, Data Structures, Data Ethics, General Networking, Data Validation, Record Keeping, Data Analysis Software, User Accounts, USB, Systems Analysis
Skills you'll gain: Incident Response, Business Continuity Planning, Continuous Monitoring, Disaster Recovery, Threat Management, Risk Analysis, Risk Mitigation, Vulnerability Scanning, Security Information and Event Management (SIEM), Vulnerability Assessments, Investigation, Penetration Testing
Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Security Management, Cybersecurity, Cyber Threat Intelligence, Investigation, Threat Detection, Communication Strategies
Skills you'll gain: Incident Response, Business Continuity, Disaster Recovery, Cybersecurity, Security Management, Computer Security Incident Management, Crisis Management, Information Assurance
Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, Infrastructure as Code (IaC), Cyber Security Policies, Security Controls, Security Strategy, Identity and Access Management, Threat Detection
Skills you'll gain: Cybersecurity, Application Security, Information Systems Security, Software Installation, System Configuration, Data Management, Security Controls, Computer Hardware, Data Security, Hardware Architecture, Data Storage, Information Technology Operations, Microsoft Windows, Firewall, Disaster Recovery, Encryption, Identity and Access Management
Google Cloud
Skills you'll gain: Database Architecture and Administration, Oracle Databases, Data Migration, Microsoft SQL Servers, Cloud Storage, Google Cloud Platform, Cloud Computing, Databases, Virtual Private Networks (VPN), Network Security, Test Tools, System Implementation, Virtual Machines
DeepLearning.AI
Skills you'll gain: Data Storage, Query Languages, Data Lakes, File Systems, Database Systems, SQL, Databases, Data Architecture, Database Management, Cloud Storage, Data Warehousing, Amazon Web Services, Apache Kafka, Amazon S3, Data Pipelines, Apache Spark, Performance Tuning, Data Transformation
University of Colorado System
Skills you'll gain: Disaster Recovery, Business Continuity Planning, Security Management, System Monitoring, System Implementation, Cyber Security Policies, Compliance Auditing, Systems Administration, Governance, Information Systems Security, Unix, Change Management
Skills you'll gain: Database Management, Databases, Relational Databases, Data Security, User Accounts, SQL, Stored Procedure, Database Design, Application Security, Threat Modeling, Vulnerability Scanning, Cybersecurity, NoSQL, Data Integrity, Role-Based Access Control (RBAC), Encryption
In summary, here are 10 of our most popular backup+and+recovery+strategies courses
- System Administration and IT Infrastructure Services: Google
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks: Google Cloud
- Computer Forensics: Infosec
- Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery : ISC2
- Incident Response and Recovery: ISC2
- Incident Response, BC, and DR Concepts: ISC2
- Strategies for Cloud Security Risk Management: Google Cloud
- Essential Aspects of Software, Hardware, and Data Backup: Microsoft
- Enterprise Database Migration: Google Cloud
- Data Storage and Queries: DeepLearning.AI