Filter by
The language used throughout the course, in both instruction and assessments.
Results for "database+vulnerabilities"
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, MySQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Transformation, IBM DB2, Relational Databases, PostgreSQL, Jupyter, Generative AI
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
- Status: Free
Campus BBVA
Skills you'll gain: Incident Management, Crisis Management, Security Information and Event Management (SIEM), Data Security, Cybersecurity, Cyber Attacks, Security Strategy, Information Systems Security, Cyber Operations, Information Assurance, Data Processing, Security Awareness, Network Security, Anomaly Detection, Data Science, Time Series Analysis and Forecasting, Unsupervised Learning
Google Cloud
Skills you'll gain: Cloud Infrastructure, Application Deployment, Infrastructure As A Service (IaaS), Kubernetes, Database Architecture and Administration, MySQL, PostgreSQL, Identity and Access Management, Cloud Computing, Data Migration, Cloud Management, Cloud API, Oracle Databases, Databases, Cloud Storage, Network Infrastructure, Cloud Security, Cloud Applications, Google Cloud Platform, Database Administration
Skills you'll gain: Bash (Scripting Language), Linux Commands, Command-Line Interface, Operating Systems, SQL, Linux, Cybersecurity, Linux Administration, Databases, Computer Hardware, Relational Databases, File Systems, User Accounts
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
Skills you'll gain: Open Web Application Security Project (OWASP), Security Controls, Risk Management, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, NIST 800-53, Cyber Security Policies, Cyber Risk, Safety Audits, Threat Detection, Compliance Auditing
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, NIST 800-53, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Data Security, Application Security, Vulnerability Management, Threat Detection, Malware Protection, Infrastructure Security, Continuous Monitoring, IT Automation, Identity and Access Management
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Role-Based Access Control (RBAC), Containerization
Skills you'll gain: Stored Procedure, Database Design, Git (Version Control System), MySQL, Databases, Database Application, Database Management, Data Visualization Software, Version Control, SQL, Tableau Software, Data Modeling, Transaction Processing, Python Programming
- Status: Free
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Security Testing, Network Security, Network Monitoring, Operating Systems
Searches related to database+vulnerabilities
In summary, here are 10 of our most popular database+vulnerabilities courses
- IBM Relational Database Administrator: IBM
- Application Security for Developers and DevOps Professionals: IBM
- Data & Cybersecurity: Campus BBVA
- Google Cloud Database Engineer: Google Cloud
- Tools of the Trade: Linux and SQL: Google
- Introduction to Cybersecurity Tools & Cyberattacks: IBM
- Play It Safe: Manage Security Risks: Google
- Assets, Threats, and Vulnerabilities: Google
- Mitigating Security Vulnerabilities on Google Cloud: Google Cloud
- Cloud Security Risks: Identify and Protect Against Threats: Google Cloud