Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "application security controls"
ISC2
Skills you'll gain: Authentications, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Data Security, Security Controls, User Provisioning, Information Systems Security, Multi-Factor Authentication, Network Architecture
Skills you'll gain: Azure Active Directory, Authentications, Identity and Access Management, Authorization (Computing), Active Directory, Role-Based Access Control (RBAC), Multi-Factor Authentication, Single Sign-On (SSO), Software As A Service, User Accounts
Skills you'll gain: Cloud Infrastructure, Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Infrastructure As A Service (IaaS), Network Monitoring, Cloud Applications, Cloud Computing Architecture, Network Architecture, Role-Based Access Control (RBAC), Network Security, Cloud Computing, Network Routing, Cloud Security, Virtual Private Networks (VPN)
- Status: [object Object]
Skills you'll gain: Quality Management, Project Scoping, Project Closure, Project Management, Project Management Life Cycle, Project Planning, Continuous Improvement Process, Agile Project Management, Project Controls, Quality Monitoring, Backlogs, Team Management, Project Documentation, Agile Methodology, Communication Planning, Project Risk Management, Change Management, Milestones (Project Management), Organizational Structure, Data Storytelling
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Information and Event Management (SIEM), Security Awareness
Fortinet, Inc.
Skills you'll gain: Virtual Private Networks (VPN), Firewall, Network Routing, Intrusion Detection and Prevention, Authentications, Lightweight Directory Access Protocols, Network Security, Network Administration, Security Controls, System Configuration, Network Monitoring
Skills you'll gain: Continuous Monitoring, Business Continuity, ISO/IEC 27001, Security Management, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
University of California, Irvine
Skills you'll gain: Time Management, Business Writing, Goal Setting, Negotiation, Cash Management, Business Planning, Planning, Project Controls, Feasibility Studies, Delegation Skills, Peer Review, Team Leadership, Business Correspondence, Creative Problem-Solving, Problem Solving, Professional Networking, Financial Analysis, Communication Strategies, Communication, Emotional Intelligence
Google Cloud
Skills you'll gain: Cloud Infrastructure, Application Deployment, Infrastructure As A Service (IaaS), Kubernetes, Database Architecture and Administration, MySQL, PostgreSQL, Identity and Access Management, Cloud Computing, Data Migration, Cloud Management, Cloud API, Oracle Databases, Databases, Cloud Storage, Network Infrastructure, Cloud Security, Cloud Applications, Google Cloud Platform, Database Administration
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Cloud Applications, Application Security, Secure Coding, DevSecOps, Cloud Computing, Identity and Access Management, Multi-Factor Authentication, Threat Modeling, Cryptography, Security Controls, Web Services
Skills you'll gain: System Configuration, Configuration Management, Cybersecurity, Security Awareness, Data Security, Security Controls, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Information Technology Operations, System Monitoring, Key Management, General Networking, Data Integrity
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
In summary, here are 10 of our most popular application security controls courses
- Access Control: ISC2
- Cybersecurity Identity and Access Solutions using Azure AD: Microsoft
- Preparing for Google Cloud Certification: Cloud Security Engineer: Google Cloud
- Google Project Management:: Google
- Security Analyst Fundamentals: IBM
- FortiGate Administrator: Fortinet, Inc.
- Security and Risk Management: Packt
- Career Success: University of California, Irvine
- Google Cloud Database Engineer: Google Cloud
- Cloud Application Security: University of Minnesota