Filter by
The language used throughout the course, in both instruction and assessments.
Results for "information security"
Skills you'll gain: Data Ethics, Data Governance, Regulation and Legal Compliance, Compliance Management, Ethical Standards And Conduct, Artificial Intelligence, Regulatory Requirements, Data Security, Business Ethics, Information Privacy, Generative AI, Process Optimization, Operational Efficiency, Accountability
Università di Napoli Federico II
Skills you'll gain: Machine Controls, Systems Architecture, Process Control, Simulation and Simulation Software, Simulations, Global Positioning Systems, Automation, Embedded Software, Virtual Environment, Threat Detection, Integration Testing, Mathematical Modeling, Technical Design, Systems Integration, Estimation, Real Time Data
Whizlabs
Skills you'll gain: Load Balancing, Network Monitoring, Microsoft Azure, Cloud Engineering, Network Administration, Virtual Private Networks (VPN), Network Engineering, Cloud Infrastructure, Network Troubleshooting, Network Security, Virtual Machines, System Configuration
University of Colorado Boulder
Skills you'll gain: Matplotlib, Machine Learning Methods, Dimensionality Reduction, Unsupervised Learning, Machine Learning Algorithms, Applied Machine Learning, Statistical Machine Learning, Pandas (Python Package), Statistical Analysis, Machine Learning, Regression Analysis, Environmental Policy, Data Science, Data Analysis, Python Programming, Environment, Natural Resource Management, International Relations, Policy Analysis, Policy Development
Juniper Networks
Skills you'll gain: Juniper Network Technologies, Firewall, Network Routers, Routing Protocols, Network Routing, Authentications, Network Monitoring, Network Administration, Open Shortest Path First (OSPF), TCP/IP, Command-Line Interface, Network Troubleshooting, Systems Administration, Network Security, Control Panels, Network Performance Management, System Monitoring, User Accounts, System Configuration, Networking Hardware
Skills you'll gain: Computer Security Incident Management, Cybersecurity, Security Management, Cyber Security Strategy, Cyber Attacks, Malware Protection, Data Security, Security Awareness, Vulnerability Assessments, Threat Detection, Email Security
- Status: Free
Tencent Cloud
Skills you'll gain: Cloud Computing Architecture, Cloud Solutions, Cloud Computing, Cloud Infrastructure, Solution Architecture, Serverless Computing, Systems Architecture, Cloud Services, Network Architecture, API Gateway, Network Infrastructure, Virtual Machines, Scalability, Load Balancing, Performance Tuning, Disaster Recovery
Skills you'll gain: Generative AI, Data Ethics, Data Quality, Data Cleansing, Data Integrity, Data Synthesis, Data Processing, Data Validation, Artificial Intelligence, Data Transformation, Personally Identifiable Information, Information Privacy
Skills you'll gain: Alteryx, Spatial Analysis, Data Transformation, Data Cleansing, Data Import/Export, Data Presentation, Data Manipulation, Geographic Information Systems, Data Visualization, Data Processing, Data Wrangling, Data Mapping, Data Compilation, Data Analysis, Data Integration, Automation
Fundação Instituto de Administração
Skills you'll gain: Crisis Management, Decision Making, Brand Management, Branding, Marketing Communications, Corporate Communications, Brand Strategy, Public Relations, Communication, Management Information Systems, Auditing
Arizona State University
Skills you'll gain: Usability, Usability Testing, Problem Solving, Human Factors, Human Centered Design, Critical Thinking and Problem Solving, Creativity, Human Factors Engineering, Kinesiology, User Research, Decision Making, Display Devices, Human Computer Interaction, Human Learning, User Experience, User Interface (UI), Data Collection, Accident Prevention, Human Machine Interfaces, Industrial Design
Skills you'll gain: Google Cloud Platform, Data Pipelines, Dataflow, Data Lakes, Data Warehousing, Data Infrastructure, Real Time Data, Unstructured Data, Tensorflow, Data Architecture, Data Processing, MLOps (Machine Learning Operations), Cloud Storage, Cloud Computing, Extract, Transform, Load, Big Data, Data Integration, Data Transformation, Serverless Computing, Cloud API
Searches related to information security
In summary, here are 10 of our most popular information security courses
- Copilot Best Practices, Ethics and Regulatory Implications:Â Microsoft
- Autonomous Aerospace Systems: Università di Napoli Federico II
- Virtual Networks in Azure:Â Whizlabs
- Modeling and Predicting Climate Anomalies:Â University of Colorado Boulder
- Introduction to Junos OS:Â Juniper Networks
- Cybersecurity Specialist Capstone:Â IBM
- Tencent Cloud Solutions Architect Associate :Â Tencent Cloud
- Data Processing and Optimization with Generative AI:Â Microsoft
- Alteryx for Beginners:Â Packt
- Gestão de Marca & Crise de Imagem: Fundação Instituto de Administração