Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "shared access signatures (sas)"
University of Pennsylvania
Skills you'll gain: Portfolio Management, Financial Modeling, Presentations, Microsoft PowerPoint, Investment Management, Business Modeling, Data Modeling, Quantitative Research, Business Analytics, Risk Modeling, Microsoft Excel, Financial Analysis, Regression Analysis
University of Michigan
Skills you'll gain: PostgreSQL, JSON, Database Management Systems, Text Mining, Query Languages, Database Systems, Database Theory, SQL, Databases, Data Access, Natural Language Processing, Unstructured Data, Data Processing, Data Storage, Python Programming
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Cybersecurity, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
- Status: Free
University of Cape Town
Skills you'll gain: Design Thinking, Risk Management, Business Modeling, Business Solutions, Innovation, Performance Measurement, Socioeconomics, Resource Management, Strategic Partnership, Financial Analysis, Entrepreneurial Finance, Finance, Stakeholder Management, Due Diligence
EIT Digital
Skills you'll gain: Semantic Web, Query Languages, Data Management, Data Integration, Data Access, Data Sharing, Data Mining, Data Transformation, Interoperability, Extensible Markup Language (XML), Web Services, Data Modeling
Skills you'll gain: Google App Engine, Application Deployment, Zero Trust Network Access, Cloud Security, Google Cloud Platform, Cloud Applications, Identity and Access Management, Cloud Computing
Skills you'll gain: Predictive Modeling, Predictive Analytics, Machine Learning, Data Ethics, MLOps (Machine Learning Operations), Applied Machine Learning, Data-Driven Decision-Making, Statistical Modeling, Performance Measurement, Supervised Learning, Machine Learning Software, Business Ethics, Decision Tree Learning, Leadership and Management, Artificial Intelligence, Business Analytics, Machine Learning Algorithms, Data Processing, Business Leadership, Feature Engineering
Coursera Project Network
Skills you'll gain: MySQL, SQL, Relational Databases, Data Access
University of California San Diego
Skills you'll gain: Telecommuting, Technology Strategies, Human Computer Interaction, Remote Access Systems, Interaction Design, Web Applications, Social Sciences, Computing Platforms, User Interface and User Experience (UI/UX) Design, Digital Communications
Michigan State University
Skills you'll gain: Peer Review, Project Planning, Constructive Feedback, Project Management, Creativity, Editing, Storytelling, Writing
Microsoft
Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, ASP.NET, Data Security, Back-End Web Development, Authorization (Computing), Application Security, JSON, Identity and Access Management, Data Storage, Application Programming Interface (API), Encryption
Skills you'll gain: Cloud Infrastructure, Cloud Applications, Identity and Access Management, Google Cloud Platform, Application Deployment, Google App Engine, Infrastructure As A Service (IaaS), Microservices, Terraform, Kubernetes, Cloud Security, CI/CD, Cloud Computing, Load Balancing, Cloud Computing Architecture, Network Architecture, Data Storage, Infrastructure as Code (IaC), Service Level Agreement, Cloud Storage
In summary, here are 10 of our most popular shared access signatures (sas) courses
- Wharton Business and Financial Modeling Capstone: University of Pennsylvania
- JSON and Natural Language Processing in PostgreSQL: University of Michigan
- Hacking and Patching: University of Colorado System
- Innovative Finance: Hacking finance to change the world : University of Cape Town
- Web of Data: EIT Digital
- Securing Cloud Applications with Identity Aware Proxy (IAP) using Zero-Trust: Google Cloud
- Machine Learning Rock Star – the End-to-End Practice: SAS
- SQL Joins : Coursera Project Network
- Social Computing: University of California San Diego
- Photography Capstone Project: Michigan State University