Filter by
The language used throughout the course, in both instruction and assessments.
Results for "secure+control+access+to+resources"
Skills you'll gain: Open Web Application Security Project (OWASP), Security Controls, Risk Management, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, NIST 800-53, Cyber Security Policies, Cyber Risk, Safety Audits, Threat Detection, Compliance Auditing
Skills you'll gain: Network Security, Encryption, Cybersecurity, Security Awareness, Cyber Attacks, Security Management, Security Strategy, Threat Detection, Firewall, Wireless Networks, Technical Support, Malware Protection, Authentications, Multi-Factor Authentication, Authorization (Computing), Generative AI
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Security Controls, Virtual Private Networks (VPN), Cloud Computing, Firewall, Network Security, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Authentications, Public Cloud
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Vulnerability Scanning, Encryption, Key Management, Virtual Machines
Skills you'll gain: Azure Active Directory, Active Directory, Microsoft Azure, Multi-Factor Authentication, Authentications, User Accounts, Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, Cloud Security, Single Sign-On (SSO), Hybrid Cloud Computing, Self Service Technologies
Fortinet, Inc.
Skills you'll gain: Virtual Private Networks (VPN), Firewall, Network Routing, Intrusion Detection and Prevention, Authentications, Lightweight Directory Access Protocols, Network Security, Network Administration, Security Controls, System Configuration, Network Monitoring
ISC2
Skills you'll gain: Authentications, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Security Controls, IT Security Architecture, User Provisioning, Multi-Factor Authentication, User Accounts, Data Security, Application Security, Information Systems Security, Network Security, Information Assurance, Data Integrity, Network Architecture
University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Usability Testing, Interaction Design, Human Factors, Information Privacy, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, Human Centered Design, Data Sharing, Design
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Role-Based Access Control (RBAC), Containerization
Skills you'll gain: Cybersecurity, Security Controls, Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, Security Management, Data Access, Enterprise Security, Authentications
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
University of Colorado System
Skills you'll gain: Disaster Recovery, Business Continuity Planning, Security Management, System Monitoring, System Implementation, Cyber Security Policies, Compliance Auditing, Systems Administration, Governance, Information Systems Security, Unix, Change Management
In summary, here are 10 of our most popular secure+control+access+to+resources courses
- Play It Safe: Manage Security Risks: Google
- IT Security: Defense against the digital dark arts : Google
- Managing Security in Google Cloud: Google Cloud
- Security Best Practices in Google Cloud: Google Cloud
- Secure Access with Azure Active Directory: Microsoft
- FortiGate Administrator: Fortinet, Inc.
- Access Controls : ISC2
- Usable Security: University of Maryland, College Park
- Cloud Security Risks: Identify and Protect Against Threats: Google Cloud
- Access Control Concepts: ISC2