Filter by
The language used throughout the course, in both instruction and assessments.
Results for "verification+techniques"
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Software Testing, Selenium (Software), Gherkin (Scripting Language), JUnit, Verification And Validation, Test Automation, Unit Testing, Security Testing, Regression Testing, Test Case, Software Development Tools, Testability, Behavior-Driven Development, Code Coverage, Performance Testing, Development Testing, Software Engineering Tools, Test Planning, Acceptance Testing
Skills you'll gain: Debugging, Technical Communication, Network Troubleshooting, Performance Tuning, Problem Management, Technical Documentation, Technical Support, System Monitoring, System Support, Capacity Management, Incident Management, Performance Testing, Application Performance Management, Network Performance Management, Continuous Monitoring, Virtual Machines, Scripting
- Status: Free
Technical University of Denmark (DTU)
Skills you'll gain: Quality Assurance, Infectious Diseases, Bioinformatics, Clinical Laboratory Science, Epidemiology, Data Collection
L&T EduTech
Skills you'll gain: Geospatial Information and Technology, Spatial Analysis, GIS Software, Spatial Data Analysis, Geographic Information Systems, Geospatial Mapping, Database Management, Database Management Systems, Construction Management, ArcGIS, Relational Databases, Visualization (Computer Graphics), Heat Maps, Civil and Architectural Engineering, Global Positioning Systems, Decision Support Systems, Building Information Modeling, As-Built Drawings, Survey Creation, AutoCAD Civil 3D
University of Leeds
Skills you'll gain: Test Case, Software Testing, Software Quality Assurance, Quality Assurance, Test Planning, Verification And Validation, Acceptance Testing, Functional Testing, Usability Testing, Performance Testing, Software Development Life Cycle
Infosec
Skills you'll gain: File Systems, Criminal Investigation and Forensics, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, File Management, Operating Systems, Data Structures, Data Ethics, General Networking, Data Validation, Record Keeping, Data Storage Technologies, Data Integrity, Data Analysis Software, User Accounts, USB, Systems Analysis
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Information Systems Security, Cybersecurity, Computer Security, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Algorithms
- Status: Free
Skills you'll gain: Web Scraping, Robotic Process Automation, Email Security, Automation, Business Process Automation, IT Automation, Data Import/Export, Unstructured Data, Spreadsheet Software
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Data Security, Cybersecurity, Authentications, Network Security, Data Integrity, Algorithms
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability
- Status: Free
University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Key Management, Public Key Cryptography Standards (PKCS), Network Security, Authentications, Mobile Security, Data Integrity, Algorithms
In summary, here are 10 of our most popular verification+techniques courses
- Software Testing and Automation: University of Minnesota
- Troubleshooting and Debugging Techniques: Google
- Antimicrobial resistance - theory and methods: Technical University of Denmark (DTU)
- Geospatial Techniques for Engineers: L&T EduTech
- Foundations of Software Testing and Validation: University of Leeds
- Computer Forensics: Infosec
- Applied Cryptography: University of Colorado System
- Automation Techniques in RPA: UiPath
- Advanced System Security Design: University of Colorado System
- Cryptography : ISC2