Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "codage sécurisé"
- Status: Free Trial
Skills you'll gain: Intrusion Detection and Prevention, Computer Security Incident Management, Cyber Threat Hunting, Cyber Attacks, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Security Controls, Threat Management, System Monitoring, IT Automation, Record Keeping, Problem Management
- Status: Free Trial
Skills you'll gain: Endpoint Security, Infrastructure Security, Security Management, Network Security, Cyber Security Policies, Security Controls, Data Security, Security Strategy, Application Security, IT Infrastructure, Information Management, Enterprise Security, Data Integrity
Google Cloud
Skills you'll gain: Vulnerability Scanning, Google App Engine, Vulnerability Assessments, Application Security, Cloud Security, Google Cloud Platform
- Status: Preview
Coursera Project Network
Skills you'll gain: Metasploit, Penetration Testing, Exploitation techniques, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment
- Status: Free Trial
Packt
Skills you'll gain: Data Security, Data Loss Prevention, Security Management, Data Management, Security Controls, Personally Identifiable Information, Information Systems Security, Data Governance, Information Management, Encryption, Identity and Access Management
Coursera Project Network
Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Data Ethics, Virtual Machines, Linux, Technical Documentation
- Status: Free Trial
Skills you'll gain: NIST 800-53, Risk Analysis, Business Risk Management, Security Management, Continuous Monitoring, Security Controls, System Monitoring, Risk Management, Cybersecurity, Cyber Risk, Cyber Security Policies, Enterprise Security, Threat Detection, Auditing
- Status: NewStatus: Free Trial
Macquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Application Security, Key Management, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Data Integrity, Authentications, Hardware Architecture, Emerging Technologies
Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)
- Status: Preview
Skills you'll gain: Cyber Risk, Cyber Security Strategy, Risk Mitigation, Risk Management Framework, Cybersecurity, Security Management, Risk Analysis, Security Strategy, Information Management, Law, Regulation, and Compliance, Financial Services, Data Security, Asset Protection, Business Continuity, Digital Assets
Skills you'll gain: Penetration Testing, Vulnerability Assessments, Network Security, Network Analysis, Cyber Security Assessment, Virtual Machines, Virtualization and Virtual Machines, Open Source Technology, Malware Protection, Linux, Microsoft Windows
- Status: Preview
Universidades Anáhuac
Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Computer Security Awareness Training, Security Controls, Intrusion Detection and Prevention, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Security Strategy, Encryption
In summary, here are 10 of our most popular codage sécurisé courses
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks: Google Cloud
- Security Infrastructure Management: Codio
- Cloud Security Scanner: Qwik Start: Google Cloud
- للمبتدئين Metasploit: أساسيات الاستغلال : Coursera Project Network
- Asset Security: Packt
- Metasploit for Beginners: Ethical Penetration Testing: Coursera Project Network
- Foundations of NIST Cybersecurity Frameworks: Packt
- Cyber Security: Applied Cryptography: Macquarie University
- Cyber Secure Coder (CSC-110) : Packt
- Examina las bases de la ciberseguridad financiera: UBITS