Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "firewall and port security configuration"
Skills you'll gain: Istio, Open Web Application Security Project (OWASP), Software Development Life Cycle, Linux Commands, Unit Testing, Application Deployment, NoSQL, Kubernetes, Bash (Scripting Language), MongoDB, Shell Script, Django (Web Framework), Object-Relational Mapping, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Jupyter, Grafana
- Status: Free
Yale University
Skills you'll gain: Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Network Monitoring, Cloud Computing Architecture, Containerization, Network Architecture, Role-Based Access Control (RBAC), Network Security, OAuth, Cloud Storage, Network Routing, Cloud Security, Virtual Private Networks (VPN)
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Encryption
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Systems Development Life Cycle, Information Assurance, Internal Controls, Information Systems Security, Compliance Auditing, Risk Management, Change Management, System Implementation, System Monitoring, Risk Analysis, Risk Mitigation, Software Development
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Security Engineering, Intrusion Detection and Prevention, Application Security, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
Skills you'll gain: Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix Shell, Query Languages, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Continuous Integration, Software Configuration Management, Software Development Tools, Code Review, Remote Access Systems, Issue Tracking, Command-Line Interface
- Status: Free
Universiteit Leiden
Skills you'll gain: Risk Management, Safety and Security, Threat Management, Crisis Management, Cybersecurity, Analysis, Security Awareness, Complex Problem Solving, International Relations, Policy Analysis, Governance
Skills you'll gain: Project Management Life Cycle, Change Management, Organizational Structure, Project Management, Project Coordination, Organizational Skills, Agile Methodology, Project Planning, Waterfall Methodology, Cross-Functional Collaboration, Communication, Decision Making
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Visualization, Statistical Programming, Ggplot2, Dimensionality Reduction, Data Visualization Software, Data Integration, Knitr, Data Analysis, Data Import/Export, General Science and Research, Data Sharing, Statistical Reporting
In summary, here are 10 of our most popular firewall and port security configuration courses
- IBM Back-End Development: IBM
- The Science of Well-Being: Yale University
- Preparing for Google Cloud Certification: Cloud Security Engineer: Google Cloud
- Assets, Threats, and Vulnerabilities: Google
- Information Systems Auditing, Controls and Assurance: The Hong Kong University of Science and Technology
- Fundamentals of Computer Network Security: University of Colorado System
- International Cyber Conflicts: The State University of New York
- Tools of the Trade: Linux and SQL: Google
- Introduction to Git and GitHub: Google
- Security & Safety Challenges in a Globalized World: Universiteit Leiden