Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "endpoint hardening"
FAIR Institute
Skills you'll gain: Cyber Risk, Risk Appetite, Cyber Governance, Risk Management, Regulatory Compliance, Risk Analysis, Enterprise Risk Management (ERM), Operational Risk, Cyber Security Strategy, Insurance, Compliance Management, Business Communication, Technical Communication, Strategic Communication, Business Reporting, Governance
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Penetration Testing, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Personally Identifiable Information, Identity and Access Management, Web Applications, Data Validation
Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Multi-Factor Authentication, Public Key Infrastructure, Mobile Security, Wireless Networks
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Application Development, Linux Commands, TCP/IP, General Networking, Scripting, MySQL, Data Structures
Coursera Project Network
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Information Systems Security, Data Ethics, Command-Line Interface, Technical Documentation
- Status: Free
Coursera Project Network
Skills you'll gain: Application Programming Interface (API), Restful API, Cloud Services, C# (Programming Language), Server Side, Application Development, Development Environment
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
- Status: Free
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Security Testing, Network Security, Network Monitoring, Operating Systems
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Cybersecurity, Dependency Analysis, Docker (Software), Git (Version Control System)
Skills you'll gain: Site Reliability Engineering, Service Level, DevOps, System Monitoring, Risk Management Framework, Software Documentation, Spreadsheet Software
SkillUp EdTech
Skills you'll gain: Blockchain, Cryptography, Encryption, Application Security, Threat Modeling, Cybersecurity, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments
FAIR Institute
Skills you'll gain: Cyber Risk, Threat Management, Continuous Monitoring, Cyber Security Strategy, Risk Management, Risk Appetite, Enterprise Risk Management (ERM), Governance Risk Management and Compliance, Cybersecurity, Business Risk Management, Risk Modeling, Risk Mitigation, Risk Analysis, Governance, Goal Setting, Automation
In summary, here are 10 of our most popular endpoint hardening courses
- Executive Communication and Governance:Â FAIR Institute
- Identifying Security Vulnerabilities:Â University of California, Davis
- Introduction to IT Security:Â Akamai Technologies, Inc.
- Akamai Network Engineering:Â Akamai Technologies, Inc.
- Metasploit for Beginners: Ethical Penetration Testing:Â Coursera Project Network
- APIs in C#: Create a Student Management API:Â Coursera Project Network
- Connect and Protect: Networks and Network Security:Â Google
- Vulnerability Scanning with Nmap: Network Scanning:Â Coursera Project Network
- Exploiting and Securing Vulnerabilities in Java Applications:Â University of California, Davis
- Site Reliability Engineering: Measuring and Managing Reliability:Â Google Cloud