Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure authentication & authorization"
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Infrastructure As A Service (IaaS), Cloud Applications, Cloud Security, Kubernetes, Cloud Computing, OAuth, Security Controls, Cloud Storage, Network Infrastructure, Containerization, Threat Management, Application Security, Virtual Private Networks (VPN), Data Security, Authorization (Computing)
Google Cloud
Skills you'll gain: Cloud Management, Serverless Computing, Google Cloud Platform, Digital Transformation, Data Governance, Cloud Services, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Cloud Infrastructure, Artificial Intelligence and Machine Learning (AI/ML), Data Strategy, Application Programming Interface (API), Real Time Data, Business Transformation, Artificial Intelligence, Data Management, Hybrid Cloud Computing, Data Warehousing, Cloud Computing, Data Security
EIT Digital
Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Management, Data Access, Vulnerability Assessments, Encryption, Information Privacy, Data Management, Big Data, Authorization (Computing)
Skills you'll gain: NoSQL, Data Warehousing, SQL, Apache Hadoop, Extract, Transform, Load, Apache Airflow, Data Security, Linux Commands, Data Migration, Database Design, Data Governance, MySQL, Apache Spark, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Cloud Storage
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Software Design, Programming Principles, Debugging, Program Development, C (Programming Language), Software Development Methodologies
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, Crisis Management, Incident Response, OpenAI, Data Ethics, Computer Security Incident Management, Artificial Intelligence, Personalized Service, Business Ethics, Information Privacy, Personally Identifiable Information, Cross-Functional Collaboration, Threat Detection, Threat Management, Expense Management, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Creative Thinking, Creativity
Skills you'll gain: CI/CD, Open Web Application Security Project (OWASP), Istio, Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Kubernetes, Jenkins, Bash (Scripting Language), Cloud Services, Git (Version Control System), DevOps, Jupyter, Grafana
Skills you'll gain: Data Ethics, Data Analysis, Data Security, Google Sheets, Databases, Data Storage, Data Quality, Data Integrity, Data Management, Data Collection, Data Manipulation, Relational Databases, SQL, Metadata Management, Unstructured Data
EIT Digital
Skills you'll gain: Embedded Systems, Embedded Software, Internet Of Things, Cryptography, Operating Systems, Security Requirements Analysis, Network Architecture, Network Security, Cybersecurity, Real Time Data, Web Services, Encryption, Engineering Software, Network Protocols, Public Key Cryptography Standards (PKCS), Wireless Networks, Computer Programming, C (Programming Language), System Testing, System Design and Implementation
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Cybersecurity, Configuration Management, Computing Platforms, Hardware Troubleshooting, Computer Hardware, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Peripheral Devices
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
In summary, here are 10 of our most popular secure authentication & authorization courses
- Security in Google Cloud:Â Google Cloud
- Google Cloud Digital Leader Training:Â Google Cloud
- Security and Privacy for Big Data - Part 1:Â EIT Digital
- IBM Data Architect:Â IBM
- IT Fundamentals for Cybersecurity:Â IBM
- Principles of Secure Coding:Â University of California, Davis
- Generative AI Cybersecurity & Privacy for Leaders:Â Vanderbilt University
- IBM DevOps and Software Engineering:Â IBM
- Prepare Data for Exploration:Â Google
- Development of Secure Embedded Systems:Â EIT Digital