Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure authentication & authorization"
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Health Systems, Personally Identifiable Information, Health Care Procedure and Regulation, Law, Regulation, and Compliance, Information Privacy, Primary Care, Health Care Administration, Healthcare Industry Knowledge, Medicare, Health Care, Pharmaceuticals, Compliance Management, Systems Thinking, Data Security, Regulation and Legal Compliance, Governance, Incident Response, Regulatory Affairs, Policy Analysis
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Infrastructure Security, Firewall, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Continuous Monitoring, Software As A Service, Vulnerability Assessments, Cloud Computing, System Configuration
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cloud Security, Information Systems Security, Computer Security Awareness Training, Malware Protection, Risk Management, Endpoint Security, Cyber Attacks, Network Security, Firewall, Enterprise Security, Cyber Security Assessment, Vulnerability Assessments
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Application Specific Integrated Circuits, Cryptography, Encryption, Technical Design, Emerging Technologies, System Design and Implementation
Skills you'll gain: Authentications, Authorization (Computing), Identity and Access Management, User Accounts, Role-Based Access Control (RBAC), Multi-Factor Authentication, Group Policy
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Databases, Software Architecture, Secure Coding, Software Design Patterns, Systems Design, Software Engineering, Software Development Tools, Software Development Life Cycle, Technical Design, Security Engineering
University of Michigan
Skills you'll gain: Data Ethics, Information Privacy, Personally Identifiable Information, Data Security, Data Governance, Ethical Standards And Conduct, Big Data, Law, Regulation, and Compliance, Data Analysis, Social Sciences, Data-Driven Decision-Making, Diversity Awareness
University of Michigan
Skills you'll gain: PHP (Scripting Language), Hypertext Markup Language (HTML), MySQL, Web Applications, Web Development, Secure Coding, Cascading Style Sheets (CSS), Development Environment, Back-End Web Development, Database Development, Web Servers, Data Validation
University of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Information Assurance, Data Security, Public Key Cryptography Standards (PKCS)
University of Michigan
Skills you'll gain: Application Deployment, Django (Web Framework), Application Development, Web Development, Web Applications, Back-End Web Development, Database Design, Data Modeling, Authentications, User Accounts
IESE Business School
Skills you'll gain: Corporate Sustainability, Business Strategy, Organizational Strategy, Environmental Social And Corporate Governance (ESG), Strategic Leadership, Strategic Thinking, Environmental Issue, Business Leadership, Environmental Policy, Law, Regulation, and Compliance, Compliance Management, Governance, Stakeholder Engagement
In summary, here are 10 of our most popular secure authentication & authorization courses
- Healthcare Law:Â University of Pennsylvania
- Introduction to Applied Cryptography:Â University of Colorado System
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks
- Cybersecurity for Business:Â University of Colorado System
- Hardware Security:Â University of Maryland, College Park
- Authentication, Authorization, and Identity with Vault:Â Google Cloud
- Secure Software Design:Â University of Colorado System
- Data Science Ethics:Â University of Michigan
- Building Web Applications in PHP:Â University of Michigan
- Cryptographic Hash and Integrity Protection:Â University of Colorado System