Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure protocols"
New York University
Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
University of London
Skills you'll gain: Computer Science, Computer Systems, Web Applications, Computer Networking, Computational Thinking, Debugging, Usability, Cybersecurity, Software Architecture, Network Protocols, Databases
Skills you'll gain: Microsoft Power Platform, Microsoft Power Automate/Flow, Power BI, Dashboard, Data Visualization, Data Integration, Business Intelligence, Business Process Automation, Productivity Software, Application Development, Microsoft 365, Platform As A Service (PaaS), Performance Analysis, Workflow Management, Data Security, Data Store, Cloud Applications, Business Process, Microsoft Teams, Data Analysis Software
University of Colorado System
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Advanced Encryption Standard (AES), Cryptographic Protocols, Application Security, Key Management, Public Key Cryptography Standards (PKCS), Secure Coding, Web Development, Email Security, PHP (Scripting Language), Data Integrity
Board Infinity
Skills you'll gain: C# (Programming Language), ASP.NET, .NET Framework, Object Oriented Programming (OOP), Docker (Software), Restful API, Azure DevOps, Model View Controller, JSON, Containerization, Microservices, Application Frameworks, Web Services, DevOps, Application Programming Interface (API), Computer Programming, Web Applications, Back-End Web Development, CI/CD, Programming Principles
Skills you'll gain: Secure Coding, Application Security, DevSecOps, Security Testing, Software Development Methodologies, Software Configuration Management, Software Development Life Cycle, Software Testing, Threat Modeling, Cyber Security Assessment, Cloud Security, Agile Methodology, Process Driven Development, Verification And Validation, Risk Management Framework
Skills you'll gain: Network Troubleshooting, Computer Networking, Cloud Management, Linux, IT Infrastructure, Cybersecurity, Microsoft Windows, Network Security, Network Protocols, TCP/IP, Systems Administration, Remote Access Systems, Desktop Support, Technical Support, File Systems, Security Strategy, Lightweight Directory Access Protocols, Security Awareness, System Support, Help Desk Support
University of California San Diego
Skills you'll gain: Session Initiation Protocols, Integrated Development Environments, Cloud Computing Architecture, GitHub, Cloud Computing, Software Design, Amazon Web Services, Cloud Infrastructure, Git (Version Control System), Cloud Services, Development Environment, System Design and Implementation, Android Development, Android Studio, Internet Of Things, Wireless Networks, Emerging Technologies, Mobile Development, Digital Communications, Visualization (Computer Graphics)
University of Maryland, College Park
Skills you'll gain: Entrepreneurial Finance, Entrepreneurship, Sales Presentations, Capital Markets, Finance, Fundraising, Private Equity, Business Valuation, Contract Negotiation, Financial Modeling, Investments, Due Diligence, Business Planning, Presentations, Storytelling
University of Michigan
Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, General Networking, Computer Networking, Encryption, Innovation, Emerging Technologies, Hypertext Markup Language (HTML)
University of Colorado System
Skills you'll gain: Requirements Elicitation, Software Design Documents, Requirements Analysis, Security Requirements Analysis, Mockups, Interviewing Skills, User Requirements Documents, Storyboarding, Functional Requirement, Goal Setting, Software Documentation, Agile Methodology, Business Requirements, Unified Modeling Language, Risk Management Framework, System Requirements, Meeting Facilitation, Prototyping, Software Development Life Cycle, Technical Documentation
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, Application Security, IT Security Architecture, Infrastructure Security, Cryptography, Regulation and Legal Compliance, Bash (Scripting Language), Encryption, Authorization (Computing), Risk Management, Virtualization
In summary, here are 10 of our most popular secure protocols courses
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- How Computers Work:Â University of London
- Microsoft Power Platform Fundamentals PL-900 Exam Prep:Â Microsoft
- Basic Cryptography and Programming with Crypto API:Â University of Colorado System
- ASP.NET for Experienced Developers:Â Board Infinity
- Secure Software Development:Â Packt
- Google شهادة تقنية المعلومات من: Google
- Internet of Things and AI Cloud:Â University of California San Diego
- New Venture Finance: Startup Funding for Entrepreneurs:Â University of Maryland, College Park
- Internet History, Technology, and Security:Â University of Michigan