Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure authentication & authorization"
Skills you'll gain: Generative AI, Google Cloud Platform, Information Privacy, Cloud Security, Personally Identifiable Information, Data Ethics, Application Security, Data Security, Artificial Intelligence, Security Controls, Safety and Security
- Status: New
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Continuous Monitoring, Network Security, Network Monitoring, Proxy Servers, Intrusion Detection and Prevention, Threat Detection, Firewall, Google Cloud Platform, Infrastructure Security, Network Troubleshooting, Identity and Access Management
University of London
Skills you'll gain: Security Management, Key Management, Human Factors (Security), Infrastructure Security, Information Privacy, Cyber Governance, Cryptography, Application Security, Network Security, Threat Modeling, OSI Models, Security Testing, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, Authorization (Computing), Security Awareness, Data Collection, Criminal Investigation and Forensics, Data Analysis
- Status: New
Skills you'll gain: Microsoft Development Tools, Cross Platform Development, .NET Framework, C# (Programming Language), Software Development Tools, Development Environment, Performance Tuning, Application Security, Secure Coding, Software Versioning, Computer Programming
- Status: New
Skills you'll gain: ASP.NET, Database Development, C# (Programming Language), Back-End Web Development, Database Management, Database Design, Object-Relational Mapping, Model View Controller, Web Applications, Software Design Patterns, Authentications, User Accounts, Maintainability, Business Logic, Authorization (Computing), Data Modeling, Data Validation
- Status: New
Packt
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Assessments, Active Directory, Web Applications, Windows Servers, Microsoft Windows, Network Security, Program Development, Bash (Scripting Language), Command-Line Interface, Shell Script, Apache Tomcat, Unix Shell, Proxy Servers, Unix Commands, Scripting
West Virginia University
Skills you'll gain: Unified Modeling Language, Verification And Validation, Threat Modeling, Security Management, Secure Coding, Scope Management, Application Security, Financial Statements, Proposal Development, Cash Flows, Object Oriented Design, Requirements Analysis, Software Design, Security Requirements Analysis, Incident Response, Database Design, Software Visualization, Business Process Management, Object Oriented Programming (OOP), Mobile Development
In summary, here are 7 of our most popular secure authentication & authorization courses
- Responsible AI for Developers: Privacy & Safety - Polski:Â Google Cloud
- Networking in Google Cloud: Network Security - 日本語版: Google Cloud
- Master of Science in Cyber Security:Â University of London
- What's New in .NET and C#:Â Packt
- Database Management and Core Application Development:Â Packt
- Hands-on Hacking:Â Packt
- Master of Science in Software Engineering:Â West Virginia University