Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure protocols"
University of Pennsylvania
Skills you'll gain: Generative AI, Data Ethics, HR Tech, Data Governance, Big Data, Machine Learning, Data Security, Governance, Business Strategy, Human Resources, Organizational Strategy, Credit Risk, Business Transformation, Risk Management, Tensorflow, Personalized Service, Digital Transformation, Data-Driven Decision-Making, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence
Skills you'll gain: Cloud Computing Architecture, Peripheral Devices, Cloud Services, Cybersecurity, Computing Platforms, Cloud Security, Cloud Infrastructure, Cloud Platforms, Network Protocols, Encryption, Cyber Attacks, Software Development Life Cycle, Cloud Storage, Application Development, General Networking, Information Technology, Cloud Computing, Databases, Computer Hardware, Computer Systems
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, Network Planning And Design, Network Architecture, General Networking, Network Performance Management, Computer Networking, Wireless Networks, Software-Defined Networking, Algorithms, System Programming, Data Integrity, Virtualization
- Status: AI skills
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Business Software, Computer Hardware, Cybersecurity, Desktop Support, Virtual Private Networks (VPN), Network Troubleshooting, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, Operating Systems, Network Protocols, TCP/IP, Application Security, Microsoft Teams, Productivity Software, Information Systems Security, Multi-Factor Authentication
- Status: AI skills
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Cloud Management, Microsoft Azure, Business Software, Computer Hardware, Virtual Machines, Identity and Access Management, Cybersecurity, Network Troubleshooting, Desktop Support, Virtual Private Networks (VPN), Azure Active Directory, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, System Monitoring, Virtualization and Virtual Machines, Disaster Recovery
- Status: Free
Skills you'll gain: OSI Models, TCP/IP, Data Centers, Network Protocols, Network Infrastructure, Local Area Networks, General Networking, Network Architecture, Computer Networking, Network Planning And Design, Network Switches, System Requirements
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
Google Cloud
Skills you'll gain: Cloud Management, Serverless Computing, Google Cloud Platform, Digital Transformation, Data Governance, Cloud Services, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Cloud Infrastructure, Data Strategy, Artificial Intelligence and Machine Learning (AI/ML), Application Programming Interface (API), Real Time Data, Business Transformation, Data Management, Hybrid Cloud Computing, Data Warehousing, Artificial Intelligence, Cloud Computing, Data Security
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Threat Detection, Cryptography, Endpoint Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Encryption, Cyber Threat Intelligence, Incident Management, Threat Management, Intrusion Detection and Prevention
University of Michigan
Skills you'll gain: Web Scraping, JSON, Network Protocols, Web Services, Restful API, Application Programming Interface (API), Extensible Markup Language (XML), Data Import/Export, Data Processing, TCP/IP, Python Programming, Scripting, Hypertext Markup Language (HTML), Data Manipulation, Data Structures
Skills you'll gain: Serverless Computing, Digital Transformation, Cloud Services, Data Ethics, Cloud Infrastructure, Google Cloud Platform, Application Programming Interface (API), Business Transformation, Applied Machine Learning, Hybrid Cloud Computing, Image Analysis, Infrastructure As A Service (IaaS), Cloud Computing, Public Cloud, Containerization, Cloud Computing Architecture, Multi-Cloud, Machine Learning, Software As A Service, Computer Vision
In summary, here are 10 of our most popular secure protocols courses
- AI For Business:Â University of Pennsylvania
- Information Technology (IT) and Cloud Fundamentals:Â IBM
- Computer Communications:Â University of Colorado System
- Microsoft IT Support Specialist:Â Microsoft
- Microsoft Cloud Support Associate:Â Microsoft
- Introduction to Networking:Â NVIDIA
- Computer Networks and Network Security:Â IBM
- Network Security:Â ISC2
- Google Cloud Digital Leader Training:Â Google Cloud
- Cybersecurity Operations Fundamentals:Â Cisco Learning and Certifications