Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "codage sécurisé"
- Status: Free Trial
Packt
Skills you'll gain: Data Security, Data Loss Prevention, Security Management, Data Management, Security Controls, Personally Identifiable Information, Information Systems Security, Data Governance, Information Management, Encryption, Identity and Access Management
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications
- Status: Free Trial
Skills you'll gain: Intrusion Detection and Prevention, Computer Security Incident Management, Cyber Threat Hunting, Cyber Attacks, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Security Controls, Threat Management, System Monitoring, IT Automation, Record Keeping, Problem Management
Skills you'll gain: Threat Management, Vulnerability Management, Vulnerability Assessments, Cloud Security, Cloud Management, Multi-Cloud, Threat Detection, Risk Management Framework, Enterprise Security
- Status: New
Google Cloud
Skills you'll gain: LLM Application, Large Language Modeling, Open Web Application Security Project (OWASP), Prompt Engineering, Application Security, Secure Coding, Security Controls, Application Programming Interface (API), System Configuration
- Status: Free
Skills you'll gain: Data Loss Prevention, Google Gemini, Generative AI, Personally Identifiable Information, Cloud API, Jupyter, Google Cloud Platform, Data Security, Scripting Languages
In summary, here are 6 of our most popular codage sécurisé courses
- Asset Security: Packt
- Cryptographic Hash and Integrity Protection: University of Colorado System
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks: Google Cloud
- Premiers pas avec Security Command Center Enterprise: Google Cloud
- Model Armor : sécuriser les déploiements d'IA: Google Cloud
- Protecting Sensitive Data in Gen AI Model Responses: Google Cloud