Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure authentication "
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Regulatory Compliance, General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Compliance Auditing, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Regulatory Requirements, Communication Planning, Risk Management, Internal Communications, Procedure Development, Data Security, Continuous Monitoring, Business Ethics, Governance, Internal Controls, Risk Analysis
University of Minnesota
Skills you'll gain: User Story, Agile Software Development, Software Design Patterns, Design Thinking, Software Development Methodologies, Agile Methodology, Agile Project Management, Process Mapping, Software Engineering, Kanban Principles, Software Development Life Cycle, Application Security, Scrum (Software Development), Object Oriented Design, Software Architecture, Software Quality (SQA/SQC), Requirements Analysis, Application Deployment, Lean Methodologies, Lean Manufacturing
University at Buffalo
Skills you'll gain: Blockchain, Test Driven Development (TDD), Cryptography, Application Development, Transaction Processing, Emerging Technologies, Application Frameworks, Web Development Tools, Software Architecture, Network Protocols, Web Applications, Program Development, Distributed Computing, Application Programming Interface (API), Cloud Platforms, Microsoft Azure, Secure Coding, Software Development, Development Environment, FinTech
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Encryption, Application Security, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Vulnerability Management, Personally Identifiable Information, Web Applications, SQL
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Security Awareness, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Key Management, Secure Coding, Hardening, Firewall, Technical Support and Services, Information Technology, Cyber Security Strategy
- Status: Free
Princeton University
Skills you'll gain: Blockchain, Cryptography, Encryption, Payment Systems, FinTech, Key Management, Digital Assets, Network Protocols, Cybersecurity, Transaction Processing, Distributed Computing, Emerging Technologies, Scripting, Financial Regulation, Public Affairs, Market Dynamics
Microsoft
Skills you'll gain: CI/CD, Cascading Style Sheets (CSS), GitHub, Database Management, C# (Programming Language), HTML and CSS, SQL, ASP.NET, Load Balancing, Version Control, Continuous Integration, Relational Databases, Git (Version Control System), Role-Based Access Control (RBAC), Continuous Delivery, Scalability, Full-Stack Web Development, Programming Principles, Graph Theory, User Interface (UI)
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Information and Event Management (SIEM), Security Awareness
Skills you'll gain: Stakeholder Communications, Incident Response, Stakeholder Engagement, Computer Security Incident Management, Data Ethics, Cybersecurity, Security Awareness, Incident Management, Data Security, Communication, Asset Protection, Ethical Standards And Conduct, Business Ethics, Interviewing Skills, Professional Networking
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
Microsoft
Skills you'll gain: Cascading Style Sheets (CSS), GitHub, C# (Programming Language), Secure Coding, HTML and CSS, User Interface and User Experience (UI/UX) Design, Figma (Design Software), Version Control, Open Web Application Security Project (OWASP), Git (Version Control System), Object Oriented Programming (OOP), Web Development, Web Design and Development, Debugging, Mockups, Authentications, Front-End Web Development, User Interface (UI), Programming Principles, User Interface (UI) Design
Searches related to secure authentication
In summary, here are 10 of our most popular secure authentication courses
- Regulatory Compliance:Â University of Pennsylvania
- Software Development Lifecycle:Â University of Minnesota
- Blockchain:Â University at Buffalo
- Introduction to Applied Cryptography:Â University of Colorado System
- Identifying Security Vulnerabilities:Â University of California, Davis
- Cybersecurity Fundamentals:Â IBM
- Bitcoin and Cryptocurrency Technologies:Â Princeton University
- Microsoft Full-Stack Developer:Â Microsoft
- Security Analyst Fundamentals:Â IBM
- Put It to Work: Prepare for Cybersecurity Jobs:Â Google