Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "endpoint hardening"
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Command-Line Interface, Firewall, System Configuration, Security Management, Network Security, Virtualization
Palo Alto Networks
Skills you'll gain: Cyber Operations, Endpoint Detection and Response, Security Information and Event Management (SIEM), Zero Trust Network Access, Cybersecurity, Cyber Threat Intelligence, Threat Modeling, Continuous Monitoring, Security Controls, Threat Detection, Incident Response, Malware Protection, Automation, Authentications, Data Lakes
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Zero Trust Network Access, Application Deployment, Network Protocols, Identity and Access Management, Software Installation, Infrastructure Architecture, Solution Architecture, Linux
- Status: New
Vanderbilt University
Skills you'll gain: Crisis Management, Incident Response, ChatGPT, Computer Security Incident Management, Cross-Functional Collaboration, Threat Modeling, Cybersecurity, Scenario Testing, Hardening, Complex Problem Solving, Discussion Facilitation, Artificial Intelligence, Decision Making, Performance Analysis, Developing Training Materials
Skills you'll gain: Google App Engine, Application Deployment, Zero Trust Network Access, Cloud Security, Google Cloud Platform, Cloud Applications, Identity and Access Management, Cloud Computing
Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Multi-Factor Authentication, Public Key Infrastructure, Mobile Security, Wireless Networks
- Status: Free
DeepLearning.AI
Skills you'll gain: Data Quality, Performance Tuning, Generative AI, MLOps (Machine Learning Operations), SQL, Open Source Technology, Artificial Intelligence and Machine Learning (AI/ML)
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Cloud Security, Microsoft Azure, Cloud Infrastructure, Cloud Computing, Infrastructure Security, Cloud Platforms, Intrusion Detection and Prevention, Network Security, Private Cloud, Threat Detection, Firewall, Security Management, Identity and Access Management
Skills you'll gain: Cyber Risk, Risk Management, Enterprise Risk Management (ERM), Risk Analysis, Risk Modeling, Security Management, Operational Risk, Cybersecurity, Business Risk Management, Compliance Management, Stakeholder Communications, Continuous Improvement Process, Compliance Reporting, Decision Making, Financial Analysis
Coursera Project Network
Skills you'll gain: Restful API, Cloud API, Application Programming Interface (API), Postman API Platform, Web Services, Java, Apache Maven, Eclipse (Software)
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Mobile Security, Application Deployment, Endpoint Security, Threat Management, Apple iOS, System Configuration, Threat Detection, Cyber Security Policies, Application Security
In summary, here are 10 of our most popular endpoint hardening courses
- Check Point Jump Start: Maestro Hyperscale Network Security:Â Check Point Software Technologies Ltd.
- Palo Alto Networks Security Operations Fundamentals:Â Palo Alto Networks
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- Check Point Jump Start: Harmony Endpoint Security:Â Check Point Software Technologies Ltd.
- ChatGPT + Cybersecurity: AI-Powered Tabletops & Training:Â Vanderbilt University
- Securing Cloud Applications with Identity Aware Proxy (IAP) using Zero-Trust:Â Google Cloud
- Introduction to IT Security:Â Akamai Technologies, Inc.
- Improving Accuracy of LLM Applications:Â DeepLearning.AI
- Check Point Jump Start: Cloud Security :Â Check Point Software Technologies Ltd.
- Practical Applications of FAIRâ„¢ for Cyber Risk Management:Â FAIR Institute