Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "database security enhancements"
Skills you'll gain: Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix Shell, Query Languages, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Skills you'll gain: Identity and Access Management, IT Security Architecture, Authentications, Continuous Monitoring, Business Continuity, Security Controls, Secure Coding, Security Testing, Cryptography, Disaster Recovery, Vulnerability Assessments, Cyber Security Assessment, Application Security, Incident Management, Security Engineering, Data Security, Network Security, User Provisioning, OSI Models, Data Loss Prevention
Skills you'll gain: Agile Software Development, Cloud Computing Architecture, Cloud Services, Agile Methodology, DevOps, Kanban Principles, Cloud Security, Cloud Infrastructure, Cloud Platforms, Cloud Computing, Agile Project Management, Cloud-Native Computing, User Story, Cloud Storage, Sprint Retrospectives, Sprint Planning, Workflow Management, CI/CD, Test Driven Development (TDD), Scrum (Software Development)
- Status: Free
Universiteit Leiden
Skills you'll gain: Risk Management, Safety and Security, Threat Management, Crisis Management, Cybersecurity, Analysis, Security Awareness, Complex Problem Solving, International Relations, Policy Analysis, Governance
Skills you'll gain: SQL, Databases, Stored Procedure, Relational Databases, Database Design, Query Languages, Database Management, Data Analysis, Jupyter, Data Manipulation, Pandas (Python Package), Transaction Processing
Skills you'll gain: CI/CD, Istio, Open Web Application Security Project (OWASP), Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Jenkins, Kubernetes, Bash (Scripting Language), Cloud Services, DevOps, Git (Version Control System), Jupyter, Grafana
University of California San Diego
Skills you'll gain: Data Structures, Graph Theory, Algorithms, Network Routing, Debugging, Network Model, Bioinformatics, Operations Research, Data Storage, Development Testing, Software Testing, Theoretical Computer Science, Computational Thinking, Network Analysis, Programming Principles, Computer Programming, Epidemiology, C++ (Programming Language), Infectious Diseases, Computer Science
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Security Management, Threat Management, Intelligence Collection and Analysis, International Relations, Public Safety and National Security, Security Awareness, Risk Management, Threat Detection, Governance, Law, Regulation, and Compliance, Innovation, Policy Development
Skills you'll gain: Data Validation, Spreadsheet Software, Data Analysis, Data Manipulation, Excel Formulas, Query Languages, Pivot Tables And Charts, SQL, Data Transformation, Database Management, Data Import/Export, Constructive Feedback
University of Michigan
Skills you'll gain: Web Scraping, Data Processing, Relational Databases, JSON, Database Design, SQL, Network Protocols, Databases, Web Services, Restful API, Programming Principles, Data Cleansing, Data Structures, Data Storytelling, Data Collection, Computer Programming, Python Programming, Data Manipulation, Development Environment, Computational Thinking
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
In summary, here are 10 of our most popular database security enhancements courses
- Tools of the Trade: Linux and SQL:Â Google
- CISSP Certified Information Systems Security Professional:Â Packt
- DevOps, Cloud, and Agile Foundations:Â IBM
- Security & Safety Challenges in a Globalized World:Â Universiteit Leiden
- Databases and SQL for Data Science with Python:Â IBM
- IBM DevOps and Software Engineering:Â IBM
- Data Structures and Algorithms:Â University of California San Diego
- International Security Management:Â Erasmus University Rotterdam
- Analyze Data to Answer Questions:Â Google
- Python for Everybody:Â University of Michigan