Filter by
The language used throughout the course, in both instruction and assessments.
Results for "data+anonymization+and+security"
University of Colorado System
Skills you'll gain: Security Engineering, System Security
University of Colorado System
Skills you'll gain: Computer Security Incident Management, Cyberattacks, Network Security, Security Engineering, System Security, Computer Networking, Security Software, Computer Security Models, Leadership and Management, Software Security
University of California, Davis
Skills you'll gain: Data Analysis, Data Management, Clinical Data Management, Data Model
University of Leeds
Skills you'll gain: Cryptography
University of Colorado System
Skills you'll gain: Network Security, Security Engineering, System Security, Computer Security Models, Cryptography, Computer Security Incident Management, Cyberattacks, Leadership and Management, Risk Management, Software Security
University of Colorado System
Skills you'll gain: Cyberattacks, Network Security, Security Engineering, Software Security, Computer Networking, Computer Security Incident Management, System Security, Cloud Computing, Computer Security Models, Operating Systems
- Status: Free
EIT Digital
Skills you'll gain: Cyberattacks, Security Engineering, Software Security, System Security, Computer Security Incident Management, Human Factors (Security), Network Security, Security Strategy, Mobile Security, Database Application, Leadership and Management
ISC2
University of Colorado Boulder
Skills you'll gain: Security Strategy, Cryptography, Communication, Problem Solving
Skills you'll gain: Computer Networking
In summary, here are 10 of our most popular data+anonymization+and+security courses
- Data Management and Applications:Â Packt
- Advanced System Security Topics:Â University of Colorado System
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- Healthcare Data Quality and Governance:Â University of California, Davis
- An Introduction to Cryptography:Â University of Leeds
- Design and Analyze Secure Networked Systems:Â University of Colorado System
- Database Essentials and Vulnerabilities:Â IBM
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Cybersecurity Awareness and Innovation:Â EIT Digital
- Access Control:Â ISC2