Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "protection"
Kennesaw State University
Skills you'll gain: Email Security, Wireless Networks, Mobile Security, Incident Response, Cybersecurity, Cyber Attacks, Firewall, Threat Detection, Cyber Security Policies, Computer Security Awareness Training, Proxy Servers, Computer Security Incident Management, Network Security, Threat Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Virtual Private Networks (VPN), Information Privacy, Computer Networking
- Status: Free
University of California San Diego
Skills you'll gain: Pollution Prevention, Environmental Policy, Environment and Resource Management, Natural Resource Management, Environment, Socioeconomics, Social Sciences, Public Policies, Civil Engineering, Economics, Life Sciences
University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Usability Testing, Interaction Design, Human Factors, Information Privacy, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, Human Centered Design, Data Sharing, Design
Skills you'll gain: Anatomy, Infectious Diseases, Life Sciences, Medical Terminology, Medical Science and Research
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
Skills you'll gain: Database Design, Database Management Systems, SQL, Database Theory, Relational Databases, Databases, MySQL, Data Integrity, Query Languages, NoSQL, Data Manipulation
University of Pennsylvania
Skills you'll gain: Branding, Logo Design, Brand Strategy, Brand Awareness, Brand Management, Packaging and Labeling, Asset Protection, Business Strategy, Strategic Planning, Product Knowledge, Regulation and Legal Compliance, Law, Regulation, and Compliance, Innovation, Creativity, Risk Management, Business Strategies, Competitive Analysis, Analysis, Writing, Economics
Alibaba Cloud Academy
Skills you'll gain: Cloud Security, Network Security, General Networking, Data Security, Application Security, Cloud Computing, Operating Systems, Linux, Information Systems Security, Cybersecurity, Microsoft Windows, Distributed Denial-Of-Service (DDoS) Attacks, Encryption
Skills you'll gain: Extract, Transform, Load, Power BI, Data Integrity, Data Validation, Data Transformation, Data Cleansing, Microsoft Power Platform, Data Storage, Data Analysis, Data Integration, Data Import/Export, Business Intelligence
- Status: Free
University of Pittsburgh
Skills you'll gain: Triage, Mitigation, Business Continuity Planning, Emergency Response, Safety and Security, Public Safety and National Security, Resilience, Emergency Medicine, First Aid, Risk Management, Cultural Diversity
Advancing Women in Tech
Skills you'll gain: Product Roadmaps, Product Management, Customer Retention, Cross-Functional Team Leadership, Professional Networking, Financial Analysis, Product Strategy, Technical Product Management, Product Requirements, Product Development, New Product Development, Product Lifecycle Management, Innovation, Team Leadership, Artificial Intelligence and Machine Learning (AI/ML), User Experience Design, Design, Performance Management, Interviewing Skills, Branding
University of Colorado Boulder
Skills you'll gain: Database Design, SQL, Database Management Systems, NoSQL, Data Warehousing, Database Theory, Relational Databases, Database Architecture and Administration, Database Systems, Databases, Data Modeling, Query Languages, MongoDB, Big Data, Apache Cassandra, Data Integrity, Data Access, Data Analysis, Data Manipulation, Data Processing
In summary, here are 10 of our most popular protection courses
- Cybersecurity Awareness for Everyone: Kennesaw State University
- Our Energy Future: University of California San Diego
- Usable Security: University of Maryland, College Park
- Fundamentals of Immunology: Innate Immunity and B-Cell Function: Rice University
- Incident Response and Digital Forensics: IBM
- Introduction to Databases: Meta
- Intellectual Property Law: University of Pennsylvania
- Protecting Cloud Architecture with Alibaba Cloud: Alibaba Cloud Academy
- Extract, Transform and Load Data in Power BI: Microsoft
- Disaster Preparedness: University of Pittsburgh