Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure authentication & authorization"
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Infrastructure As A Service (IaaS), Cloud Applications, Cloud Security, Kubernetes, Cloud Computing, OAuth, Security Controls, Cloud Storage, Network Infrastructure, Containerization, Threat Management, Application Security, Virtual Private Networks (VPN), Data Security, Authorization (Computing)
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Skills you'll gain: CI/CD, Istio, Open Web Application Security Project (OWASP), Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Kubernetes, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Jenkins, Bash (Scripting Language), Cloud Services, DevOps, Git (Version Control System), Jupyter, Grafana
Skills you'll gain: Network Security, Information Systems Security, Cybersecurity, Application Security, Encryption, Computer Security, Security Controls, Cyber Attacks, Security Awareness, Data Security, Cryptography, Threat Modeling, Security Management, Network Administration, Information Assurance, Wireless Networks, Hardening, Firewall, Malware Protection, Authentications
- Status: New
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, Database Administration, MySQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Transformation, IBM DB2, Relational Databases, Jupyter, Generative AI
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Security Information and Event Management (SIEM), Threat Management, Cyber Attacks
University of Pennsylvania
Skills you'll gain: Generative AI, Data Ethics, HR Tech, Data Governance, Big Data, Machine Learning, Data Security, Governance, Business Strategy, Human Resources, Organizational Strategy, Credit Risk, Business Transformation, Risk Management, Tensorflow, Personalized Service, Digital Transformation, Data-Driven Decision-Making, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence
University at Buffalo
Skills you'll gain: Blockchain, Test Driven Development (TDD), Cryptography, Application Development, Transaction Processing, Emerging Technologies, Application Frameworks, Web Development Tools, Software Architecture, Network Protocols, Web Applications, Program Development, Distributed Computing, Application Programming Interface (API), Cloud Platforms, Microsoft Azure, Secure Coding, Software Development, Development Environment, FinTech
Skills you'll gain: Azure Active Directory, Data Security, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), Cloud Security, Active Directory, Threat Modeling, Security Strategy, Authentications, Data Storage, Application Security, Database Architecture and Administration, Virtual Machines, Infrastructure Security, Kubernetes, Continuous Monitoring, Web Applications, System Monitoring, Network Security
Skills you'll gain: Network Troubleshooting, Hardware Troubleshooting, Command-Line Interface, Desktop Support, Operating Systems, Network Administration, Technical Support and Services, System Support, System Configuration, Computer Hardware, Network Security, Unix Commands, Microsoft Windows, General Networking, Technical Support, Mac OS, Security Controls, Linux, Mobile Security, Infrastructure Security
- Status: New
Skills you'll gain: Spring Framework, Cloud-Native Computing, Software Development Life Cycle, Hibernate (Java), Docker (Software), Git (Version Control System), GitHub, HTML and CSS, Object Oriented Programming (OOP), Spring Boot, Object-Relational Mapping, Development Environment, Web Design and Development, Object Oriented Design, Java Programming, Generative AI, Interviewing Skills, CI/CD, Java, Professional Networking
Skills you'll gain: Data Ethics, Data Analysis, Data Security, Google Sheets, Databases, Data Storage, Data Quality, Data Integrity, Data Management, Data Collection, Data Manipulation, Relational Databases, SQL, Metadata Management, Unstructured Data
In summary, here are 10 of our most popular secure authentication & authorization courses
- Security in Google Cloud:Â Google Cloud
- IT Fundamentals for Cybersecurity:Â IBM
- IBM DevOps and Software Engineering:Â IBM
- IT Security: Defense against the digital dark arts :Â Google
- IBM Relational Database Administrator:Â IBM
- Security Analyst Fundamentals:Â IBM
- AI For Business:Â University of Pennsylvania
- Blockchain:Â University at Buffalo
- Microsoft Azure Security Engineer Associate (AZ-500):Â Microsoft
- Preparation for CompTIA A+ Certification:Â IBM