Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "datenintegritã¤t"
Skills you'll gain: User Accounts, Linux, Linux Administration, Shell Script, Linux Commands, Command-Line Interface, System Monitoring, Unix Commands, Unix, File Management, Network Monitoring, Software Installation, Virtual Machines, System Configuration, Operating Systems, Virtualization
- Status: Free Trial
Board Infinity
Skills you'll gain: Sprint Planning, Sprint Retrospectives, Agile Methodology, Project Estimation, Scaled Agile Framework, Estimation, Agile Project Management, Backlogs, User Story, Dependency Analysis, Capacity Management, Management Reporting, Collaboration, Risk Mitigation, Stakeholder Management, Cross-Functional Collaboration, Team Building
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Information Privacy, Safety and Security, Multi-Factor Authentication
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Unix, Computer Security, Application Security, Vulnerability Assessments, Unix Commands, Microsoft Windows, System Programming, Linux, Debugging, Command-Line Interface, Windows PowerShell, Computer Architecture, OS Process Management
- Status: Free Trial
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Multi-Factor Authentication, Network Security, Information Systems Security, Patch Management, Network Monitoring, Data Security, Malware Protection, Mobile Security, Authorization (Computing), Identity and Access Management
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Cybersecurity, General Data Protection Regulation (GDPR), Threat Modeling, Data Ethics, Data Governance, Data Integrity, Cyber Risk, Data Encryption Standard, Vulnerability Assessments, Security Management, Vulnerability, Security Software, Risk Management, Compliance Management, Security Strategy, Data Access, NIST 800-53
- Status: New
Skills you'll gain: Probability & Statistics, Statistics, Data Analysis, Statistical Analysis, Regression Analysis, Analytics, Statistical Methods, Probability, Data Science, Statistical Modeling, Data-Driven Decision-Making, Statistical Inference, Probability Distribution, Predictive Analytics, Applied Machine Learning, Correlation Analysis
- Status: Preview
Skills you'll gain: Database Design, Power BI, Dashboard, Data Modeling, Business Intelligence, Microsoft SQL Servers, Transact-SQL, Relational Databases, Data Warehousing, Data Visualization Software, SQL, Business Analytics, Advanced Analytics, Data Integrity
- Status: New
Skills you'll gain: System Configuration, Security Awareness, Mobile Security, Software Installation, Cybersecurity, Microsoft Windows, Command-Line Interface, Operating Systems, Desktop Support, Application Security, Mac OS, Unix, Unix Commands, Malware Protection, Network Administration, Network Troubleshooting, Network Support, Linux Commands, Hardware Troubleshooting, Firewall
- Status: Free Trial
Edureka
Skills you'll gain: Amazon S3, Amazon Web Services, AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Elastic Compute Cloud, Cloud Computing, Cloud Computing Architecture, Cloud Infrastructure, Cloud Services, Command-Line Interface, Cloud Storage, Multi-Factor Authentication, Security Controls, Scalability
Coursera Project Network
Skills you'll gain: Video Production, Content Creation, Social Media Content, Social Media, Live Streaming, Social Media Strategy, Marketing, Business
- Status: NewStatus: Free Trial
Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Zero Trust Network Access, Cyber Attacks, Authentications, Application Security, Cyber Risk, Computer Security, Information Systems Security, Data Security, Encryption, Multi-Factor Authentication, Vulnerability Assessments, Cryptography, Authorization (Computing), Identity and Access Management
In summary, here are 10 of our most popular datenintegritã¤t courses
- Linux Command Line for Beginners: Packt
- Scrum Fundamentals and Industry Planning Techniques: Board Infinity
- Cybersecurity: What to Do When You Are a Victim: Kennesaw State University
- Security & Ethical Hacking: Attacking Unix and Windows : University of Colorado Boulder
- Comprehensive Cisco Security Techniques and Automation: Packt
- Data Security & Information Privacy: Macquarie University
- Statistics & Mathematics for Data Science & Data Analytics: Packt
- Database Design and Operational Business Intelligence: Edureka
- CompTIA A+ Core 2 (220-1102): Packt
- AWS Cloud Essentials: Edureka