Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cloud computing security"
- Status: Free
Infosec
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Detection, Threat Modeling, MITRE ATT&CK Framework, Endpoint Detection and Response, Cybersecurity, Malware Protection, Security Information and Event Management (SIEM), Anomaly Detection, Generative AI, Network Analysis
Skills you'll gain: User Centered Design, Responsive Web Design, Web Design and Development, Prototyping, Front-End Web Development, User Interface and User Experience (UI/UX) Design, Figma (Design Software), Design Elements And Principles, Wireframing, Typography, UI Components, Web Applications, Mobile Development
Microsoft
Skills you'll gain: Unsupervised Learning, Generative AI, Data Management, Natural Language Processing, MLOps (Machine Learning Operations), Supervised Learning, Microsoft Azure, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Infrastructure Architecture, Data Infrastructure, Applied Machine Learning, Reinforcement Learning, Data Ethics, Artificial Intelligence, Test Case, OpenAI, Human Computer Interaction, Performance Testing, Application Deployment
- Status: Free
Skills you'll gain: Quality Monitoring, Cloud API, Application Programming Interface (API), Web Services, Application Development, Customer Communications Management, Account Management, Business Communication, Data Migration
Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Threat Modeling, Threat Management, Event Monitoring, Vulnerability Management, Security Information and Event Management (SIEM), Cybersecurity, Continuous Monitoring, Incident Response, Security Management, Network Security, Network Monitoring
Akamai Technologies, Inc.
Skills you'll gain: Linux, Linux Administration, File Systems, Linux Commands, Operating Systems, User Accounts, OS Process Management, File Management, Unix Shell, Bash (Scripting Language), Unix Commands, System Configuration, Authorization (Computing), Command-Line Interface, Open Source Technology, Systems Administration, Virtualization, Virtual Machines
University of Colorado System
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Advanced Encryption Standard (AES), Cryptographic Protocols, Application Security, Key Management, Public Key Cryptography Standards (PKCS), Secure Coding, Web Development, Email Security, PHP (Scripting Language), Data Integrity
- Status: Free
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Endpoint Detection and Response, Security Information and Event Management (SIEM), IT Automation, Automation, Event Monitoring, Cyber Threat Hunting, Cyber Threat Intelligence, Continuous Monitoring, System Monitoring, Security Management, Anomaly Detection, Cybersecurity, Security Controls, Interactive Data Visualization, Artificial Intelligence and Machine Learning (AI/ML)
Coursera Project Network
Skills you'll gain: Data Analysis, Data Cleansing, Microsoft Excel, Data Manipulation, Data Quality, Excel Formulas, Real Time Data
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Selenium (Software), Software Testing, Security Testing, Test Automation, Performance Testing, Functional Testing, Mobile Development Tools, Test Execution Engine, Test Planning, Application Security, Mobile Development, Performance Tuning, Browser Compatibility, Application Performance Management, Vulnerability Scanning, Continuous Deployment
École Polytechnique Fédérale de Lausanne
Skills you'll gain: Scala Programming, Java, Data Validation, Object Oriented Programming (OOP), Build Tools, Debugging, Software Design Patterns, Development Environment, Software Testing, Unit Testing, Data Structures, Data Modeling
Johns Hopkins University
Skills you'll gain: Clinical Data Management, Data Quality, Quality Assurance, Clinical Trials, Data Cleansing, Data Management, Data Integrity, Microsoft Excel, Data Compilation, Data Collection, Data Sharing, Data Security, Patient Treatment, Continuous Monitoring
Searches related to cloud computing security
In summary, here are 10 of our most popular cloud computing security courses
- Cyber Threat Hunting:Â Infosec
- Designing User Interfaces and Experiences (UI/UX):Â IBM
- Microsoft AI & ML Engineering:Â Microsoft
- WhatsApp Business Platform for Developers:Â Meta
- Threat Investigation:Â Cisco Learning and Certifications
- Operating Systems Fundamentals:Â Akamai Technologies, Inc.
- Basic Cryptography and Programming with Crypto API:Â University of Colorado System
- Automated Cyber Security Incident Response:Â EDUCBA
- Data Cleaning in Excel: Techniques to Clean Messy Data:Â Coursera Project Network
- Web and Mobile Testing with Selenium:Â University of Minnesota