Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure control access to resources"
- Status: New AI skills
Google
Skills you'll gain: Computer Networking, Package and Software Management, Network Security, Network Troubleshooting, Systems Administration, Cloud Infrastructure, IT Infrastructure, TCP/IP, General Networking, Information Systems Security, File Systems, Microsoft Windows, Routing Protocols, Desktop Support, Lightweight Directory Access Protocols, Cybersecurity, Encryption, Computer Hardware, Technical Support, Software Installation
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
DeepLearning.AI
Skills you'll gain: Tensorflow, Computer Vision, Image Analysis, Keras (Neural Network Library), Deep Learning, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning
- Status: Free
University of Virginia
Skills you'll gain: Mechanics, Torque (Physics), Physics, Physical Science, Experimentation
Columbia University
Skills you'll gain: Construction Estimating, Cost Estimation, Construction Management, Bidding, Cost Control, Cash Flows, Project Closure, Lean Methodologies, Project Controls, Cash Flow Forecasting, Earned Value Management, Procurement, Commercial Construction, Purchasing, Request for Proposal, Project Design, Change Orders, Building Information Modeling, Systems Of Measurement
Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Information Systems Security Assessment Framework (ISSAF), Security Strategy, Security Awareness, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis, Personally Identifiable Information
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Google Sheets, Business Analytics, Spreadsheet Software, Analytical Skills, Data Sharing, Data Cleansing, Data Processing, Data Strategy, Data Visualization Software, SQL
Skills you'll gain: Istio, Open Web Application Security Project (OWASP), Software Development Life Cycle, Linux Commands, Unit Testing, Object-Relational Mapping, Application Deployment, NoSQL, Kubernetes, Bash (Scripting Language), MongoDB, Shell Script, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Serverless Computing, Jupyter, Grafana
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Infrastructure As A Service (IaaS), Cloud Applications, Cloud Security, Kubernetes, Cloud Computing, OAuth, Security Controls, Cloud Storage, Network Infrastructure, Containerization, Threat Management, Application Security, Virtual Private Networks (VPN), Data Security, Authorization (Computing)
- Status: AI skills
Skills you'll gain: NoSQL, Data Warehousing, SQL, Apache Hadoop, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, IBM Cognos Analytics, MySQL, Apache Spark, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Jupyter, Generative AI, Professional Networking
University of Michigan
Skills you'll gain: Hypertext Markup Language (HTML), Web Design, Web Content Accessibility Guidelines, Web Design and Development, Usability, Semantic Web, Cloud Hosting, Web Servers, Data Validation
Skills you'll gain: Desktop Support, Computer Hardware, Technical Support, Software Installation, Technical Documentation, Hardware Troubleshooting, Computer Networking, Information Technology, Technical Communication, Software Systems, Linux, Microsoft Windows
In summary, here are 10 of our most popular secure control access to resources courses
- Google IT Support:Â Google
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- Introduction to TensorFlow for Artificial Intelligence, Machine Learning, and Deep Learning:Â DeepLearning.AI
- How Things Work: An Introduction to Physics:Â University of Virginia
- Construction Cost Estimating and Cost Control:Â Columbia University
- Foundations of Cybersecurity:Â Google
- Foundations: Data, Data, Everywhere:Â Google
- IBM Back-End Development:Â IBM
- Security in Google Cloud:Â Google Cloud
- IBM Data Engineering:Â IBM