Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security and access management in teradata"
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, MySQL, PostgreSQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Transformation, IBM DB2, Relational Databases, Jupyter, Generative AI
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, ISO/IEC 27001, Computer Security Awareness Training, Cyber Risk, Information Assurance
Skills you'll gain: Malware Protection, Computer Security Awareness Training, Security Awareness, Mobile Security, Network Security, Data Security, Cyber Attacks, Cybersecurity, Human Factors (Security), Email Security, Identity and Access Management, Multi-Factor Authentication, Authentications
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
Skills you'll gain: Cybersecurity, Encryption, Cyber Attacks, Email Security, Computer Security Awareness Training, Security Awareness, Data Security, Information Systems Security, Malware Protection, Authentications, Authorization (Computing), Security Controls, Hardening, Identity and Access Management, Multi-Factor Authentication, Browser Compatibility
- Status: [object Object]
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
University of Michigan
Skills you'll gain: Talent Management, Team Motivation, Team Building, Teamwork, Team Management, Talent Pipelining, Influencing, Team Leadership, Employee Onboarding, Employee Performance Management, Employee Coaching, Conflict Management, Employee Engagement, Interviewing Skills, Persuasive Communication, Leadership, Organizational Leadership, Professional Networking, Business Leadership, Leadership Development
Advancing Women in Tech
Skills you'll gain: Product Roadmaps, Product Management, Customer Retention, Cross-Functional Team Leadership, Professional Networking, Financial Analysis, Product Strategy, Technical Product Management, Product Requirements, Product Development, New Product Development, Product Lifecycle Management, Innovation, Team Leadership, Artificial Intelligence and Machine Learning (AI/ML), User Experience Design, Design, Performance Management, Interviewing Skills, Branding
Rutgers the State University of New Jersey
Skills you'll gain: Strategic Sourcing, Lean Six Sigma, Lean Manufacturing, Demand Planning, Procurement, Supplier Relationship Management, Manufacturing Operations, Forecasting, Process Improvement, Supplier Management, Operations Management, Purchasing, Supply Management, Operational Efficiency, Warehouse Management, Supply Chain Planning, Sales Management, Inventory and Warehousing, Inventory Management System, Transportation, Supply Chain, and Logistics
IIMA - IIM Ahmedabad
Skills you'll gain: Leadership, Organizational Change, Organizational Leadership, Team Leadership, Change Management, Leadership and Management, Business Leadership, Business Ethics, Strategic Leadership, Self-Awareness, Personal Development, Decision Making, Emotional Intelligence, Influencing, Communication, Relationship Building
Skills you'll gain: Identity and Access Management, IT Security Architecture, Authentications, Continuous Monitoring, Business Continuity, Security Controls, Secure Coding, Security Testing, Cryptography, Disaster Recovery, Vulnerability Assessments, Cyber Security Assessment, Application Security, Incident Management, Security Engineering, Data Security, Network Security, User Provisioning, OSI Models, Data Loss Prevention
University of California San Diego
Skills you'll gain: Data Structures, Graph Theory, Algorithms, Network Routing, Debugging, Network Model, Bioinformatics, Advanced Mathematics, Operations Research, Data Storage, Development Testing, Software Testing, Theoretical Computer Science, Computational Thinking, Network Analysis, Programming Principles, Computer Programming, Epidemiology, C++ (Programming Language), Infectious Diseases
In summary, here are 10 of our most popular security and access management in teradata courses
- IBM Relational Database Administrator: IBM
- Security Management and Governance: Royal Holloway, University of London
- Security Awareness Training: ISC2
- Application Security for Developers and DevOps Professionals: IBM
- Introduction to Cybersecurity Essentials: IBM
- Microsoft Cybersecurity Analyst: Microsoft
- Leading People and Teams: University of Michigan
- Real-World Product Management: Advancing Women in Tech
- Supply Chain Management: Rutgers the State University of New Jersey
- Leadership Skills: IIMA - IIM Ahmedabad