Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure control access to resources"
Skills you'll gain: Project Management Life Cycle, Change Management, Organizational Structure, Project Management, Project Coordination, Organizational Skills, Agile Methodology, Project Planning, Waterfall Methodology, Cross-Functional Collaboration, Communication, Decision Making
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Presentation, Database Design, Data Visualization, MySQL, Presentations, Descriptive Statistics, Extract, Transform, Load, Business Intelligence, Data Visualization Software, Tableau Software, Stored Procedure, Interactive Data Visualization, Regression Analysis, Data-Driven Decision-Making, Excel Formulas, Microsoft Excel
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Continuous Integration, Software Configuration Management, Software Development Tools, Code Review, Remote Access Systems, Issue Tracking, Command-Line Interface
Skills you'll gain: Project Scoping, Project Documentation, Project Management Life Cycle, Project Management, Goal Setting, Project Management Software, Stakeholder Management, Cost Benefit Analysis, Resource Allocation, Accountability
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Google Sheets, Business Analytics, Spreadsheet Software, Analytical Skills, Data Sharing, Data Cleansing, Data Processing, Data Strategy, Data Visualization Software, SQL
Skills you'll gain: Data Ethics, Data Analysis, Data Security, Google Sheets, Databases, Data Storage, Data Quality, Data Integrity, Data Management, Data Collection, Data Manipulation, Relational Databases, SQL, Metadata Management, Unstructured Data
Google Cloud
Skills you'll gain: Generative AI, Application Development, Artificial Intelligence, Google Cloud Platform, Machine Learning Methods, Machine Learning
DeepLearning.AI
Skills you'll gain: Deep Learning, Artificial Neural Networks, Tensorflow, Supervised Learning, Keras (Neural Network Library), Artificial Intelligence, Machine Learning, Python Programming, NumPy, Performance Tuning
Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Risk Mitigation, Security Information and Event Management (SIEM), Security Controls, Threat Modeling, Security Strategy, Continuous Monitoring, Data Security, Information Systems Security, Computer Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), Auditing
Skills you'll gain: Network Security, Cybersecurity, Encryption, Security Awareness, Data Security, Cryptography, Threat Modeling, Security Management, Computer Security Awareness Training, Wireless Networks, Hardening, Firewall, Malware Protection, Authentications, Identity and Access Management, Authorization (Computing), Technical Support, Generative AI
- Status: New
Skills you'll gain: Generative AI, Data Wrangling, Unit Testing, Supervised Learning, Feature Engineering, Keras (Neural Network Library), Deep Learning, ChatGPT, Natural Language Processing, Data Cleansing, Jupyter, Data Analysis, Unsupervised Learning, Data Manipulation, PyTorch (Machine Learning Library), Artificial Intelligence, Data Import/Export, Data Ethics, Exploratory Data Analysis, Predictive Analytics
In summary, here are 10 of our most popular secure control access to resources courses
- Foundations of Project Management:Â Google
- IBM Business Intelligence (BI) Analyst:Â IBM
- Assets, Threats, and Vulnerabilities:Â Google
- Introduction to Git and GitHub:Â Google
- Project Initiation: Starting a Successful Project:Â Google
- Foundations: Data, Data, Everywhere:Â Google
- Prepare Data for Exploration:Â Google
- Introduction to Generative AI :Â Google Cloud
- Neural Networks and Deep Learning:Â DeepLearning.AI
- Play It Safe: Manage Security Risks:Â Google