Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vpn configuration and security"
University of Illinois Urbana-Champaign
Skills you'll gain: Business Strategy, Organizational Change, Stakeholder Management, Organizational Structure, Corporate Strategy, Governance, Organizational Strategy, Team Building, Strategic Leadership, Conflict Management, Leadership Development, Organizational Leadership, Business Management, Trustworthiness, Organizational Effectiveness, Business Ethics, Team Management, Team Motivation, Change Management, Decision Making
Skills you'll gain: Package and Software Management, File Systems, Microsoft Windows, Desktop Support, Linux, Operating Systems, OS Process Management, Linux Administration, Remote Access Systems, System Monitoring, Command-Line Interface, User Accounts, Systems Administration, Technical Support and Services, File Management, Linux Commands, Software Installation, Identity and Access Management, Authorization (Computing), Virtualization
Skills you'll gain: Bash (Scripting Language), Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Google
Skills you'll gain: Prompt Engineering, Generative AI, Productivity Software, Artificial Intelligence, Computer Security Awareness Training, Operational Efficiency, Innovation, Human Machine Interfaces, Information Privacy, Machine Learning, Content Creation, Business Ethics
University of Michigan
Skills you'll gain: Programming Principles, Computer Programming, Python Programming, Software Installation, Development Environment
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption
University of Minnesota
Skills you'll gain: Cloud Security, Application Security, Network Security, Cloud Computing, Cybersecurity, Information Systems Security, Security Controls, Infrastructure Security, Remote Access Systems, Public Key Infrastructure, Cryptography, Vulnerability Assessments, Virtualization, Virtual Machines, Encryption, Authorization (Computing)
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Diplomacy, Infrastructure Architecture, Conflict Management, Security Management, Political Sciences, Media and Communications, Psychology
University of Michigan
Skills you'll gain: Data Structures, Python Programming, Programming Principles, Data Import/Export, Data Manipulation, Development Environment, File Management
University of London
Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, Cybersecurity, ISO/IEC 27001, Cyber Risk, Security Strategy, Risk Management Framework, Human Factors
DeepLearning.AI
Skills you'll gain: Tensorflow, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Performance Tuning, Artificial Neural Networks, Machine Learning Algorithms, Analysis, Debugging
In summary, here are 10 of our most popular vpn configuration and security courses
- Strategic Leadership and Management: University of Illinois Urbana-Champaign
- Operating Systems and You: Becoming a Power User: Google
- Tools of the Trade: Linux and SQL: Google
- Google AI Essentials: Google
- Programming for Everybody (Getting Started with Python): University of Michigan
- Assets, Threats, and Vulnerabilities: Google
- Cloud Security Basics: University of Minnesota
- International Cyber Conflicts: The State University of New York
- Python Data Structures: University of Michigan
- Cyber Security Fundamentals: University of London