Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vpn configuration and security"
Rutgers the State University of New Jersey
Skills you'll gain: Strategic Sourcing, Supplier Management, Procurement, Supplier Relationship Management, Supplier Performance Management, Negotiation, Vendor Management, Contract Negotiation, Request For Quotation (RFQ), Stakeholder Management, Contract Management, Purchasing, Market Analysis, Supply Management, Request for Proposal, Competitive Analysis, Risk Management, Supply Chain Management, Strategic Partnership, Business Ethics
Palo Alto Networks
Skills you'll gain: Cybersecurity, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Firewall, Threat Detection, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing
University of Illinois Urbana-Champaign
Skills you'll gain: Data Storytelling, Online Advertising, Marketing Analytics, Keyword Research, Email Marketing, Digital Media Strategy, Digital Advertising, Google Analytics, Analytics, Marketing Communications, Content Marketing, Social Media Marketing, Marketing, Digital Marketing, Web Analytics, Marketing Strategies, Integrated Marketing Communications, Performance Analysis, Trend Analysis, Consumer Behaviour
Johns Hopkins University
Skills you'll gain: HTML and CSS, Javascript, Responsive Web Design, Ajax, Front-End Web Development, Web Design, Web Applications, Hypertext Markup Language (HTML), Browser Compatibility, Web Development, Cascading Style Sheets (CSS), Usability, Cross Platform Development
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP)
Johns Hopkins University
Skills you'll gain: Shiny (R Package), Rmarkdown, Exploratory Data Analysis, Regression Analysis, Leaflet (Software), Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Statistical Inference, Predictive Modeling, Statistical Hypothesis Testing, Data Wrangling, Data Visualization, Plotly, Machine Learning Algorithms, Plot (Graphics), Knitr
Skills you'll gain: Large Language Modeling, Artificial Intelligence, Generative AI, Data Ethics, Artificial Intelligence and Machine Learning (AI/ML), Applied Machine Learning, Deep Learning, Artificial Neural Networks, Governance, Prompt Engineering, Machine Learning, Automation, Digital Transformation, Business Transformation, Business Technologies, Ethical Standards And Conduct, Computer Vision, Emerging Technologies, Natural Language Processing
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Prompt Engineering, Kubernetes, Application Deployment, Cloud Storage, Infrastructure As A Service (IaaS), Containerization, Cloud Computing, CI/CD, Cloud Computing Architecture, Cloud Security, Cloud Services, Load Balancing, Service Level Agreement, Infrastructure as Code (IaC), Virtual Machines, Microservices, Service Level
University of Pennsylvania
Skills you'll gain: Return On Investment, Financial Reporting, Capital Budgeting, Financial Statements, Financial Modeling, Mathematical Modeling, Statistical Modeling, Regression Analysis, Business Modeling, Income Statement, Financial Analysis, Risk Analysis, Cash Flows, Business Mathematics, Financial Planning, Corporate Finance, Predictive Analytics, Spreadsheet Software, Google Sheets, Microsoft Excel
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Information and Event Management (SIEM), Security Controls, Document Management, Data Integrity, Technical Communication, Technical Documentation
California Institute of the Arts
Skills you'll gain: Typography, Design Elements And Principles, Graphic Design, Visual Design, Logo Design, Design Software, Digital Design, Creative Design, Graphic and Visual Design, Color Theory, Adobe InDesign, Photo Editing, Photography, Style Guides, Branding, Peer Review, Art History, Design, Aesthetics, Design Strategies
University of Alberta
Skills you'll gain: Software Architecture, Model View Controller, Unified Modeling Language, Object Oriented Design, Service Oriented Architecture, API Design, Systems Architecture, Web Services, Software Design Patterns, Software Design, Simple Object Access Protocol (SOAP), Microservices, Restful API, Software Design Documents, Software Visualization, Code Review, Solution Architecture, Software Systems, Object Oriented Programming (OOP), Java
In summary, here are 10 of our most popular vpn configuration and security courses
- Global Procurement and Sourcing: Rutgers the State University of New Jersey
- Palo Alto Networks Cybersecurity Foundation: Palo Alto Networks
- Digital Marketing: University of Illinois Urbana-Champaign
- HTML, CSS, and Javascript for Web Developers: Johns Hopkins University
- Security Analyst Fundamentals: IBM
- Data Science: Johns Hopkins University
- Introduction to Artificial Intelligence (AI): IBM
- Architecting with Google Compute Engine: Google Cloud
- Finance & Quantitative Modeling for Analysts: University of Pennsylvania
- Incident Response and Digital Forensics: IBM