Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "firewall and port security configuration"
University of California, Irvine
Skills you'll gain: Stakeholder Management, Conflict Management, Project Management, Project Planning, Project Management Life Cycle, Project Documentation, Requirements Management, Project Scoping, Organizational Structure, Planning, Influencing
- Status: Free
Universiteit Leiden
Skills you'll gain: Public Safety and National Security, Research, Research Methodologies, Policy Analysis, Media and Communications, Social Studies, International Relations, Political Sciences, Trend Analysis, Investigation, Psychology
Multiple educators
Skills you'll gain: Dashboard, Pseudocode, Jupyter, Algorithms, Data Mining, Pandas (Python Package), Correlation Analysis, Web Scraping, NumPy, Probability & Statistics, Predictive Modeling, Big Data, Automation, Data Visualization Software, Data Collection, Data Science, GitHub, Python Programming, Machine Learning Algorithms, Unsupervised Learning
Skills you'll gain: SQL, Web Scraping, Database Design, MySQL, Data Transformation, IBM DB2, Extract, Transform, Load, Relational Databases, Data Architecture, Jupyter, Data Pipelines, Big Data, Database Management, Data Warehousing, Data Governance, Databases, Stored Procedure, Data Manipulation, Automation, Python Programming
University of Pennsylvania
Skills you'll gain: Financial Statements, Return On Investment, Financial Statement Analysis, Finance, Financial Reporting, Capital Budgeting, Financial Accounting, Financial Modeling, Working Capital, Balance Sheet, Accrual Accounting, Accounting, Cash Flows, Income Statement, Generally Accepted Accounting Principles (GAAP), Financial Analysis, Tax Planning, Equities, Financial Planning, Corporate Finance
University of Michigan
Skills you'll gain: Data Structures, Python Programming, Data Manipulation, Development Environment, File Management, Data Analysis, Computer Programming, Software Installation
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Firewall, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Vulnerability Assessments, Cloud Computing, System Configuration
University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Information Assurance, Security Controls, Incident Response
DeepLearning.AI
Skills you'll gain: Supervised Learning, Jupyter, Scikit Learn (Machine Learning Library), Machine Learning, NumPy, Predictive Modeling, Feature Engineering, Artificial Intelligence, Classification And Regression Tree (CART), Python Programming, Regression Analysis, Unsupervised Learning, Data-Driven Decision-Making
Skills you'll gain: Dashboard, SQL, Descriptive Statistics, Jupyter, Statistical Analysis, Data Analysis, Probability Distribution, Pandas (Python Package), Data Visualization Software, Statistics, Statistical Methods, Statistical Hypothesis Testing, Databases, Stored Procedure, Web Scraping, Relational Databases, Automation, Data Science, GitHub, Python Programming
Skills you'll gain: Software Development Life Cycle, Linux Commands, Unit Testing, Bash (Scripting Language), Shell Script, Git (Version Control System), GitHub, Development Environment, Version Control, File Management, Jupyter, Software Engineering, Software Architecture, Application Deployment, Automation, Flask (Web Framework), Web Scraping, Python Programming, Open Source Technology, Application Development
Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Workflow Management, Stakeholder Engagement, Cyber Operations, Cybersecurity, Stakeholder Management, Security Information and Event Management (SIEM), Incident Response, Security Management, Computer Security Incident Management, Cyber Attacks, Stakeholder Communications, Incident Management, Event Monitoring, Security Controls, Data Security, Customer Relationship Building, Network Security, Team Oriented
In summary, here are 10 of our most popular firewall and port security configuration courses
- Initiating and Planning Projects: University of California, Irvine
- Terrorism and Counterterrorism: Comparing Theory and Practice: Universiteit Leiden
- Data Science Foundations: University of London
- Data Engineering Foundations: IBM
- Introduction to Finance and Accounting: University of Pennsylvania
- Python Data Structures: University of Michigan
- Palo Alto Networks Cybersecurity Foundation: Palo Alto Networks
- Cyber Security Fundamentals: University of London
- Supervised Machine Learning: Regression and Classification : DeepLearning.AI
- Data Science Fundamentals with Python and SQL: IBM