Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "protection"
New York University
Skills you'll gain: Cyber Attacks, Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cybersecurity, IT Security Architecture, Cloud Security, NIST 800-53, Cyber Threat Intelligence, Hybrid Cloud Computing, Cloud Computing Architecture, Payment Card Industry (PCI) Data Security Standards, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Data Integrity
Kennesaw State University
Skills you'll gain: Data Collection, Lean Six Sigma, Six Sigma Methodology, Quality Improvement, Process Improvement, Business Process, Project Management, Project Planning, Process Mapping, Descriptive Statistics, Stakeholder Management, Customer Insights, Data Integrity, Statistical Analysis
Skills you'll gain: Database Design, MySQL, IBM DB2, Relational Databases, Databases, Database Management, PostgreSQL, Database Architecture and Administration, SQL, Data Integrity, Data Modeling, Data Manipulation, Data Structures
Politecnico di Milano
Skills you'll gain: Machine Learning Methods, Unsupervised Learning, Supervised Learning, Machine Learning Algorithms, Machine Learning, Ethical Standards And Conduct, Data Ethics, Artificial Intelligence, Reinforcement Learning, General Data Protection Regulation (GDPR), Infrastructure Architecture, Governance, Cloud Platforms, Deep Learning, Law, Regulation, and Compliance, Regulation and Legal Compliance, Information Privacy, Artificial Intelligence and Machine Learning (AI/ML), Computer Science, Technology Strategies
EIT Digital
Skills you'll gain: General Data Protection Regulation (GDPR), Personally Identifiable Information, Information Privacy, Law, Regulation, and Compliance, Regulation and Legal Compliance, Data Sharing, Governance
University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Cybersecurity, Network Security, Digital Communications, Authentications, Data Integrity, Algorithms
Johns Hopkins University
Skills you'll gain: Clinical Data Management, Clinical Trials, Sample Size Determination, Clinical Research, Quality Assurance, Data Cleansing, Data Management, Regulatory Compliance, Data Integrity, Microsoft Excel, Statistical Reporting, Data Collection, Scientific Methods, Biostatistics, Data Sharing, Statistical Analysis, Patient Safety, Record Keeping, Risk Management, Ethical Standards And Conduct
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
Kennesaw State University
Skills you'll gain: Cybersecurity, Cyber Security Policies, Computer Security Awareness Training, Cyber Attacks, Threat Management, Cyber Risk, Personally Identifiable Information, Threat Detection, Information Privacy, Authentications, General Data Protection Regulation (GDPR), Identity and Access Management
- Status: Free
The Pennsylvania State University
Skills you'll gain: Food and Beverage, Manufacturing and Production, Market Dynamics, Economics, Operating Cost, Business Economics, Food Quality Assurance And Control, Production Process, Production Management, Food Safety and Sanitation, Environmental Issue, Environment, Health Care, Life Sciences, Natural Resource Management, Resource Utilization
Politecnico di Milano
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Regulation and Legal Compliance, Information Privacy, Artificial Intelligence
Infosec
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Secure Coding, Application Security, Encryption, Data Security, Web Applications, Cryptography, Authentications, SQL, Data Validation
In summary, here are 10 of our most popular protection courses
- Enterprise and Infrastructure Security: New York University
- Six Sigma Tools for Define and Measure: Kennesaw State University
- Introduction to Relational Databases (RDBMS): IBM
- Artificial Intelligence: an Overview: Politecnico di Milano
- Privacy in Europe: EIT Digital
- Cryptography: University of Maryland, College Park
- Clinical Trials Operations: Johns Hopkins University
- International Cyber Conflicts: The State University of New York
- What Is Cybersecurity?: Kennesaw State University
- Dairy Production and Management: The Pennsylvania State University