Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cisco device security"
Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Cybersecurity, Investigation, Event Monitoring, Threat Detection, Risk Management, Communication Strategies
Skills you'll gain: Cloud Infrastructure, Cloud Applications, Identity and Access Management, Google Cloud Platform, Application Deployment, Google App Engine, Infrastructure As A Service (IaaS), Microservices, Terraform, Kubernetes, Cloud Security, CI/CD, Cloud Computing, Load Balancing, Cloud Services, Cloud Computing Architecture, Network Architecture, Public Cloud, Data Storage, Infrastructure as Code (IaC)
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Software Design, Programming Principles, Debugging, Program Development, Computer Programming, C (Programming Language), Software Development Methodologies
Google Cloud
Skills you'll gain: Google Workspace, File Management, Collaborative Software, Document Management, Data Sharing, Productivity Software, Cloud Storage, Identity and Access Management, Software Installation
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Threat Detection, Firewall, Cybersecurity, Geographic Information Systems
University of Minnesota
Skills you'll gain: Business Systems Analysis, Systems Analysis, Requirements Analysis, Business Requirements, Process Flow Diagrams, User Requirements Documents, Data Modeling, Requirements Management, Business Process Modeling, Dataflow
University of Colorado System
Skills you'll gain: Routing Protocols, Network Routing, TCP/IP, Network Protocols, Network Architecture, Network Performance Management, Computer Networking, OSI Models, Local Area Networks, Algorithms
Board Infinity
Skills you'll gain: HR Tech, People Analytics, Human Resources Management and Planning, Human Resources, Data Ethics, Generative AI, Talent Acquisition, Employee Engagement, Recruitment, Human Resource Strategy, Training Programs, Employee Training, Workforce Planning, Artificial Intelligence, Ethical Standards And Conduct, Information Privacy
University of Michigan
Skills you'll gain: Cyber Security Policies, Security Engineering, Information Systems Security, Computer Security Awareness Training, Security Awareness, Vulnerability, Policy Analysis, Political Sciences, Public Policies, Public Safety and National Security, Safety and Security, Human Factors, Human Computer Interaction, Usability
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Contingency Planning, Risk Management, Cyber Security Strategy, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cybersecurity, IT Management, Governance, Cyber Risk, Information Technology, Staff Management, Organizational Leadership, Organizational Structure
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
EC-Council
Skills you'll gain: Malware Protection, Cybersecurity, Data Security, Intrusion Detection and Prevention, Computer Security Awareness Training, Cyber Threat Intelligence, Data Integrity, Network Analysis, Microsoft Windows, Mac OS, Linux, Web Applications, File Systems
In summary, here are 10 of our most popular cisco device security courses
- Incident Response and Recovery: ISC2
- Architecting with Google Compute Engine en Español: Google Cloud
- Principles of Secure Coding: University of California, Davis
- Google Drive: Google Cloud
- Advanced System Security Design: University of Colorado System
- Analysis for Business Systems: University of Minnesota
- Packet Switching Networks and Algorithms: University of Colorado System
- Generative AI in HR - Impact and Application of Gen AI: Board Infinity
- Securing Digital Democracy: University of Michigan
- Road to the CISO – Culminating Project Course: Kennesaw State University