Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cisco device security"
Akamai Technologies, Inc.
Skills you'll gain: Routing Protocols, OSI Models, Remote Access Systems, TCP/IP, Network Protocols, General Networking, Network Troubleshooting, Computer Networking, Networking Hardware, Network Administration, Network Security, Network Infrastructure, Network Model, Virtual Private Networks (VPN), Wireless Networks, Network Routers, Network Routing, Dynamic Host Configuration Protocol (DHCP), Intrusion Detection and Prevention, Security Controls
Palo Alto Networks
Skills you'll gain: Endpoint Security, Security Information and Event Management (SIEM), Zero Trust Network Access, Cybersecurity, Cyber Threat Intelligence, Threat Modeling, Security Engineering, Continuous Monitoring, IT Security Architecture, Threat Detection, Incident Response, Malware Protection, Automation, Data Lakes
University of Illinois Urbana-Champaign
Skills you'll gain: Distributed Computing, File Systems, Cloud Computing, Operating Systems, Transaction Processing, Network Security, Data Centers, Authorization (Computing), Apache Hadoop, Data Store, Authentications, Cryptography, NoSQL, Algorithms
University of Minnesota
Skills you'll gain: Cucumber (Software), Gherkin (Scripting Language), Software Testing, Testability, Test Case, Behavior-Driven Development, Code Coverage, Acceptance Testing, Unit Testing, Functional Testing, Test Automation, Requirements Analysis, Java Programming
Skills you'll gain: User Story, Business Requirements, Requirements Analysis, Requirements Elicitation, Business Analysis, User Requirements Documents, Gap Analysis, Business Systems Analysis, Functional Specification, Business Process Modeling, Stakeholder Management
Skills you'll gain: Desktop Support, Operating Systems, Command-Line Interface, System Support, Mobile Security, Network Security, Microsoft Windows, Unix Commands, Technical Support, Mac OS, Linux, Network Troubleshooting, System Configuration, Network Administration, Software Installation, Firewall, Encryption, Malware Protection
Università di Napoli Federico II
Skills you'll gain: International Relations, Political Sciences, Social Sciences, World History, Governance, Cultural Diversity, Research Methodologies, Economics, Environment and Resource Management, Security Strategy
Skills you'll gain: Data Ethics, Generative AI, Business Ethics, Legal Risk, Socioeconomics, Ethical Standards And Conduct, Artificial Intelligence, Environmental Social And Corporate Governance (ESG), Machine Learning, Intellectual Property, Information Privacy, Workforce Management, Workforce Development, Safety and Security
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Data Storage Technologies, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Encryption, Key Management, Virtual Machines
- Status: Free
University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Encryption, Vulnerability Assessments, Key Management, Public Key Cryptography Standards (PKCS), Authentications, Mobile Security, Data Integrity
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cybersecurity, Threat Management, Security Controls, Cyber Security Strategy, Threat Detection, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Data Security, Network Security, Security Management, Enterprise Security, Information Assurance, Incident Response, Data Integrity, Disaster Recovery
Skills you'll gain: Microsoft Copilot, Prompt Engineering, Microsoft 365, Microsoft Outlook, Productivity Software, ChatGPT, Microsoft Word, Microsoft PowerPoint, Microsoft Excel, Artificial Intelligence, Generative AI, Identity and Access Management, Data Security
In summary, here are 10 of our most popular cisco device security courses
- Networking Fundamentals:Â Akamai Technologies, Inc.
- Palo Alto Networks Security Operations Fundamentals:Â Palo Alto Networks
- Cloud Computing Concepts: Part 2:Â University of Illinois Urbana-Champaign
- Black-box and White-box Testing:Â University of Minnesota
- Requirements Gathering in Business Analysis:Â Microsoft
- Core 2: OS, Software, Security and Operational Procedures:Â IBM
- Global Politics: Università di Napoli Federico II
- Generative AI: Impact, Considerations, and Ethical Issues:Â IBM
- Security Best Practices in Google Cloud:Â Google Cloud
- Introduction to Applied Cryptography:Â University of London