Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "firewall and port security configuration"
Skills you'll gain: Istio, Open Web Application Security Project (OWASP), Software Development Life Cycle, Linux Commands, Unit Testing, Object-Relational Mapping, Application Deployment, NoSQL, Kubernetes, Bash (Scripting Language), MongoDB, Shell Script, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Serverless Computing, Jupyter, Grafana
- Status: Free
Yale University
Skills you'll gain: Growth Mindedness, Optimism, Positive Behavior Support, Goal Setting, Resilience, Self-Motivation, Self-Awareness, Emotional Intelligence, Mental Health, Psychology, Social Skills, Decision Making, Time Management
Skills you'll gain: Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Network Monitoring, Cloud Computing Architecture, Containerization, Network Architecture, Role-Based Access Control (RBAC), Network Security, OAuth, Cloud Storage, Network Routing, Cloud Security, Virtual Private Networks (VPN)
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
Skills you'll gain: Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix Shell, Query Languages, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Systems Development Life Cycle, Information Assurance, Internal Controls, Information Systems Security, Compliance Auditing, Risk Management, Security Controls, Change Management, System Implementation, System Monitoring, Risk Analysis, Risk Mitigation, Software Development
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Visualization, Statistical Programming, Ggplot2, Dimensionality Reduction, Data Visualization Software, Data Integration, Knitr, Data Analysis, Data Import/Export, General Science and Research, Data Sharing, Statistical Reporting
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Continuous Integration, Software Configuration Management, Software Development Tools, Code Review, Remote Access Systems, Issue Tracking, Command-Line Interface
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Threat Modeling, Personally Identifiable Information, Malware Protection, Email Security
Skills you'll gain: Project Management Life Cycle, Change Management, Organizational Structure, Project Management, Project Coordination, Organizational Skills, Agile Methodology, Project Planning, Waterfall Methodology, Cross-Functional Collaboration, Communication, Decision Making
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Application Security, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls
In summary, here are 10 of our most popular firewall and port security configuration courses
- IBM Back-End Development: IBM
- The Science of Well-Being: Yale University
- Preparing for Google Cloud Certification: Cloud Security Engineer: Google Cloud
- Assets, Threats, and Vulnerabilities: Google
- Tools of the Trade: Linux and SQL: Google
- International Cyber Conflicts: The State University of New York
- Information Systems Auditing, Controls and Assurance: The Hong Kong University of Science and Technology
- Data Science: Foundations using R: Johns Hopkins University
- Introduction to Git and GitHub: Google
- Introduction to Cybersecurity Fundamentals: Coursera Instructor Network