• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Secure Rman Backup Encryption

Results for "secure rman backup encryption"


  • P

    Packt

    Writing Secure Code in ASP.NET

    Skills you'll gain: Authentications, Cryptography, Encryption, .NET Framework, Open Web Application Security Project (OWASP), Application Security, Vulnerability Scanning, Data Security, Data Validation, Cross Platform Development, Development Environment

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Writing Secure Code in C++

    Skills you'll gain: Secure Coding, Application Security, Computer Programming Tools, System Programming, C++ (Programming Language), C (Programming Language), Software Development Tools, Exploit development, Debugging, Programming Principles, Embedded Systems, Interoperability, Unix, Vulnerability Assessments, Unix Commands, Operating Systems, Data Security, Linux, Microsoft Windows, Data Validation

    2.8
    Rating, 2.8 out of 5 stars
    ·
    33 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Preview
    Preview
    B

    Ball State University

    Cybersecurity and Secure Software Design

    Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity

    Build toward a degree

    5
    Rating, 5 out of 5 stars
    ·
    6 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Requirements Engineering: Secure Software Specifications

    Skills you'll gain: Requirements Elicitation, Software Design Documents, Requirements Analysis, Security Requirements Analysis, Mockups, Interviewing Skills, User Requirements Documents, Storyboarding, Functional Requirement, Goal Setting, Software Development Methodologies, Software Documentation, Agile Methodology, Business Requirements, Unified Modeling Language, Risk Management Framework, System Requirements, Meeting Facilitation, Prototyping, Software Development Life Cycle

    4.5
    Rating, 4.5 out of 5 stars
    ·
    852 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Preview
    Preview
    E

    EC-Council

    Secure Full Stack MEAN Developer

    Skills you'll gain: Node.JS, MongoDB, Angular, Full-Stack Web Development, JavaScript Frameworks, Restful API, Web Applications, Web Development, NoSQL, Front-End Web Development, Application Security, Web Development Tools, Web Servers, Application Programming Interface (API), Javascript, Back-End Web Development

    4.6
    Rating, 4.6 out of 5 stars
    ·
    91 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Design and Analyze Secure Networked Systems

    Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Cryptography, Key Management, Threat Modeling, Authorization (Computing), Encryption, Email Security, Authentications, Vulnerability Assessments

    3.9
    Rating, 3.9 out of 5 stars
    ·
    233 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Preview
    Preview
    E

    EDUCBA

    Zabbix: Configure, Monitor & Secure IT Systems

    Skills you'll gain: System Monitoring, Network Monitoring, Event Monitoring, System Configuration, Incident Management, Linux Servers, Virtualization, Virtual Machines, TCP/IP, Servers, Security Controls, Apache, Windows Servers, Software Installation, MySQL

    Mixed · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    I

    Infosec

    Certified Secure Software Lifecycle Professional (CSSLP)

    Skills you'll gain: Application Security, Threat Modeling, Secure Coding, Security Testing, Software Development Life Cycle, Security Controls, Risk Management Framework, Security Requirements Analysis, Software Development, Authorization (Computing), Data Security, Vulnerability Assessments, Identity and Access Management, Verification And Validation, Cryptography, Software Architecture, Software Design

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Requirements Gathering for Secure Software Development

    Skills you'll gain: Requirements Analysis, User Requirements Documents, Software Development Methodologies, Requirements Elicitation, Agile Methodology, Functional Requirement, Software Design Documents, System Requirements, Software Development Life Cycle, Verification And Validation, Technical Communication

    4.6
    Rating, 4.6 out of 5 stars
    ·
    685 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Secure Access with Azure Active Directory

    Skills you'll gain: Azure Active Directory, Active Directory, Microsoft Azure, Multi-Factor Authentication, Authentications, User Accounts, Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, User Provisioning, Cloud Security, Single Sign-On (SSO), Hybrid Cloud Computing

    4.4
    Rating, 4.4 out of 5 stars
    ·
    89 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Preview
    Preview
    C

    Coursera

    Secure Coding: SSDLC, OWASP & SonarQube Essentials

    Skills you'll gain: Open Web Application Security Project (OWASP), DevSecOps, Jenkins, Software Development Life Cycle, CI/CD, Application Security, Secure Coding, Continuous Integration, DevOps, Continuous Delivery, Vulnerability Scanning, Vulnerability Assessments, Software Quality Assurance, Security Awareness, Dependency Analysis, Compliance Management, Automation

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free
    Free
    C

    Coursera

    Firebase Authentication: Build Secure Angular Apps

    Skills you'll gain: Angular, Authentications, Web Applications, Web Development Tools, Authorization (Computing), User Interface (UI), GitHub

    Intermediate · Guided Project · Less Than 2 Hours

1…101112…132

In summary, here are 10 of our most popular secure rman backup encryption courses

  • Writing Secure Code in ASP.NET: Packt
  • Writing Secure Code in C++: Infosec
  • Cybersecurity and Secure Software Design: Ball State University
  • Requirements Engineering: Secure Software Specifications: University of Colorado System
  • Secure Full Stack MEAN Developer: EC-Council
  • Design and Analyze Secure Networked Systems: University of Colorado System
  • Zabbix: Configure, Monitor & Secure IT Systems: EDUCBA
  • Certified Secure Software Lifecycle Professional (CSSLP): Infosec
  • Requirements Gathering for Secure Software Development: University of Colorado System
  • Secure Access with Azure Active Directory: Microsoft

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok