Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "backup and security configuration"
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Systems Development Life Cycle, Information Assurance, Internal Controls, Information Systems Security, Compliance Auditing, Risk Management, Security Controls, Change Management, System Implementation, System Monitoring, Risk Analysis, Risk Mitigation, Software Development
Stanford University
Skills you'll gain: Data Structures, Graph Theory, Algorithms, Bioinformatics, Theoretical Computer Science, Computational Thinking, Network Analysis, Network Routing, Analysis, Probability, Design Strategies, Computer Science
Skills you'll gain: Project Management Life Cycle, Change Management, Organizational Structure, Project Management, Organizational Skills, Agile Methodology, Waterfall Methodology, Communication, Interpersonal Communications, Decision Making
- Status: AI skills
Skills you'll gain: Data Storytelling, Dashboard, Data Visualization Software, Plotly, Data Presentation, Data Wrangling, Data Visualization, SQL, Generative AI, Interactive Data Visualization, Exploratory Data Analysis, Data Cleansing, Big Data, Jupyter, Matplotlib, Data Analysis, Statistical Analysis, Pandas (Python Package), Excel Formulas, Professional Networking
Skills you'll gain: Package and Software Management, File Systems, Microsoft Windows, Desktop Support, Linux, Operating Systems, OS Process Management, Linux Administration, Remote Access Systems, System Monitoring, Command-Line Interface, User Accounts, Systems Administration, Windows PowerShell, Technical Support and Services, File Management, Linux Commands, Software Installation, Identity and Access Management, Authorization (Computing)
University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Information Assurance, Security Controls, Incident Response
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
Skills you'll gain: Design Thinking, User Research, User Experience Design, User Centered Design, Web Content Accessibility Guidelines, Usability Testing, Prototyping, Wireframing, Sprint Planning
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, General Networking, Routing Protocols, Network Protocols, Network Routing, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks, Data Integrity
Skills you'll gain: Istio, Open Web Application Security Project (OWASP), Software Development Life Cycle, Linux Commands, Unit Testing, Object-Relational Mapping, Application Deployment, NoSQL, Kubernetes, Bash (Scripting Language), MongoDB, Shell Script, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Serverless Computing, Jupyter, Grafana
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
Skills you'll gain: React Native, Software Development Life Cycle, iOS Development, Flutter (Software), Swift Programming, Apple Xcode, Mobile Development, Android Studio, User Centered Design, Android Development, Apple iOS, React Redux, Git (Version Control System), GitHub, Mobile Development Tools, React.js, Android (Operating System), HTML and CSS, Front-End Web Development, Generative AI
In summary, here are 10 of our most popular backup and security configuration courses
- Information Systems Auditing, Controls and Assurance: The Hong Kong University of Science and Technology
- Algorithms: Stanford University
- Foundations of Project Management: Google
- IBM Data Analyst: IBM
- Operating Systems and You: Becoming a Power User: Google
- Cyber Security Fundamentals: University of London
- International Cyber Conflicts: The State University of New York
- Foundations of User Experience (UX) Design: Google
- The Bits and Bytes of Computer Networking: Google
- IBM Back-End Development: IBM