Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security tools and technologies"
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
Skills you'll gain: Network Security, Encryption, Cybersecurity, Security Awareness, Cyber Attacks, Security Management, Security Strategy, Threat Detection, Firewall, Wireless Networks, Technical Support, Malware Protection, Authentications, Multi-Factor Authentication, Authorization (Computing), Generative AI
University of Michigan
Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, General Networking, Computer Networking, Encryption, Web Servers, Innovation, Hypertext Markup Language (HTML)
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Infrastructure As A Service (IaaS), Cloud Applications, Cloud Security, Kubernetes, Cloud Computing, OAuth, Security Controls, Cloud Storage, Network Infrastructure, Containerization, Threat Management, Application Security, Virtual Private Networks (VPN), Data Security, Authorization (Computing)
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Skills you'll gain: Bash (Scripting Language), Linux Commands, Command-Line Interface, Operating Systems, SQL, Linux, Cybersecurity, Linux Administration, Databases, Computer Hardware, Relational Databases, File Systems, User Accounts
- Status: [object Object]
Google
Skills you'll gain: Storyboarding, Wireframing, UI/UX Research, Responsive Web Design, User Experience Design, Design Thinking, User Research, Information Architecture, Figma (Design Software), Usability Testing, User Story, Web Design, Design Reviews, Usability, Presentations, Design Research, Persona (User Experience), Ideation, User Centered Design, Mockups
- Status: Free
Yale University
Skills you'll gain: Positive Behavior Support, Goal Setting, Resilience, Self-Awareness, Behavioral Economics, Emotional Intelligence, Mental Health, Psychology, Social Skills, Time Management
- Status: Free
Stanford University
Skills you'll gain: Cooking, Preventative Care, Food and Beverage, Behavioral Health, Socioeconomics, Cultural Diversity, Education and Training, Culture, Environmental Issue
- Status: [object Object]
Skills you'll gain: Media Planning, Search Engine Marketing, Email Marketing, Data Storytelling, Social Media Strategy, Search Engine Optimization, Social Media, Social Media Marketing, Content Creation, Order Fulfillment, A/B Testing, Target Audience, Digital Marketing, E-Commerce, Loyalty Programs, Social Media Management, Customer Retention, Persona Development, Performance Measurement, Marketing Automation
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
In summary, here are 10 of our most popular security tools and technologies courses
- Google Cybersecurity: Google
- IT Security: Defense against the digital dark arts : Google
- Internet History, Technology, and Security: University of Michigan
- Cybersecurity Tools and Technologies: Microsoft
- Security in Google Cloud: Google Cloud
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Tools of the Trade: Linux and SQL: Google
- Google UX Design: Google
- The Science of Well-Being: Yale University
- Stanford Introduction to Food and Health: Stanford University