Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "codage sécurisé"
- Status: Free Trial
Skills you'll gain: Public Key Infrastructure, Cloud Security, Hardening, Infrastructure Security, Application Security, Information Systems Security, Network Security, Cyber Security Assessment, System Configuration, Cryptography, Encryption, Mobile Security
Skills you'll gain: Penetration Testing, Vulnerability Assessments, Network Security, Network Analysis, Cyber Security Assessment, Virtual Machines, Virtualization and Virtual Machines, Open Source Technology, Malware Protection, Linux, Microsoft Windows
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Wireless Networks, Mobile Security, General Networking, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Computer Security Awareness Training, Personally Identifiable Information, Information Privacy, Emerging Technologies
Skills you'll gain: Threat Management, Vulnerability Management, Vulnerability Assessments, Cloud Security, Cloud Management, Multi-Cloud, Threat Detection, Risk Management Framework, Enterprise Security
- Status: New
Google Cloud
Skills you'll gain: LLM Application, Open Web Application Security Project (OWASP), Threat Modeling, Large Language Modeling, Application Security, Prompt Engineering, Secure Coding, Security Controls, Responsible AI, Security Software, API Design, System Configuration
- Status: Free
Skills you'll gain: Data Loss Prevention, Google Gemini, Generative AI, Personally Identifiable Information, Cloud API, Jupyter, Google Cloud Platform, Data Security, Scripting Languages
In summary, here are 6 of our most popular codage sécurisé courses
- Security Engineering and Cryptography: Packt
- Digital Forensics for Pentesters - Hands-On Learning: Packt
- Cybersecurity: Protecting your Information on the Go: Kennesaw State University
- Premiers pas avec Security Command Center Enterprise: Google Cloud
- Model Armor : sécuriser les déploiements d'IA: Google Cloud
- Protecting Sensitive Data in Gen AI Model Responses: Google Cloud