Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "infrastructure security"
- Status: Free Trial
Skills you'll gain: Hardware Architecture, Security Engineering, Internet Of Things, Encryption, Information Systems Security, Vulnerability Assessments, Cybersecurity, Threat Modeling, Data Security, Security Requirements Analysis, Vulnerability Management, Information Privacy
Skills you'll gain: Cloud Security, Threat Detection, Google Cloud Platform, Threat Management, Cloud Computing, Intrusion Detection and Prevention, Network Security, Firewall, Security Information and Event Management (SIEM), Incident Response, Endpoint Security
- Status: NewStatus: Preview
Skills you'll gain: Microsoft Copilot, Microsoft Power Automate/Flow, Microsoft Power Platform, Microsoft 365, Security Management, Threat Detection, Compliance Management, Artificial Intelligence, Business Process Automation, Automation, Incident Response, Generative AI
- Status: New
Macquarie University
Skills you'll gain: Identity and Access Management, AWS Identity and Access Management (IAM), Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, Azure Active Directory, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Threat Detection, Cryptography, Risk Management, Remote Access Systems
- Status: New
Macquarie University
Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Cyber Security Policies, Intrusion Detection and Prevention, Threat Detection, Disaster Recovery, Cybersecurity, Cyber Risk, Cyber Security Assessment, Crisis Management, Threat Management, Business Continuity, Safety and Security, Security Software, Strategic Communication, Regulation and Legal Compliance
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Systems Architecture, Linux
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture
- Status: Free Trial
Skills you'll gain: OAuth, Cloud API, Application Programming Interface (API), Restful API, Security Controls, Application Security, Network Security, Data Security, JSON, Identity and Access Management, Threat Management
- Status: Free Trial
Skills you'll gain: Cloud Management, Cloud Security, Google Cloud Platform, Cost Management, System Monitoring, Cloud Computing, Information Technology Operations, Cost Control, Identity and Access Management, Site Reliability Engineering, Resource Management, Data Access, Resource Allocation, DevOps, Data Security, Cybersecurity
- Status: NewStatus: Free Trial
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Data Ethics, Generative AI, AWS SageMaker, Cloud Security, MLOps (Machine Learning Operations), Data Security, Role-Based Access Control (RBAC), Data Governance, Artificial Intelligence, Encryption, Public Cloud, General Data Protection Regulation (GDPR)
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Role-Based Access Control (RBAC), Multi-Factor Authentication, Authorization (Computing), Security Controls, User Accounts, Key Management, Encryption, Command-Line Interface
- Status: Free Trial
Google Cloud
Skills you'll gain: Prompt Engineering, Google Cloud Platform, Kubernetes, Identity and Access Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Infrastructure, Cloud Security, Containerization, Cloud Services, Virtual Machines, Infrastructure As A Service (IaaS), Generative AI Agents, Data Loss Prevention, Cloud Storage, Network Infrastructure, Security Management, Application Development, Cloud Computing, Malware Protection, Continuous Monitoring
In summary, here are 10 of our most popular infrastructure security courses
- Implementing Security in IoT and Edge Devices: LearnQuest
- Enhanced Network Security Approach on Google Cloud: Google Cloud
- Microsoft Copilot: Power Platform & Security Best Practices: Whizlabs
- Cyber Security: Identity Access Management and Authentication: Macquarie University
- Cyber Security: Incident Response - Theory to Practice: Macquarie University
- Check Point Jump Start: Harmony Endpoint Security: Check Point Software Technologies Ltd.
- Security & Ethical Hacking: Attacking Unix and Windows : University of Colorado Boulder
- API Security on Google Cloud's Apigee API Platform: Google Cloud
- Understanding Google Cloud Operations and Security בעברית: Google Cloud
- Responsible AI with AWS Security and Governance: LearnKartS