Filter by
The language used throughout the course, in both instruction and assessments.
Results for "data+protection+strategy+implementation"
- Status: Free
Campus BBVA
Skills you'll gain: Cyberattacks, System Security, System Software, Computer Security Models, Network Security, Software Security, Computer Security Incident Management, Mobile Security
The Hong Kong University of Science and Technology
Skills you'll gain: Sales, Strategy and Operations, Business Development, Entrepreneurship, Leadership and Management, Marketing, Strategy
Skills you'll gain: Network Security
- Status: Free
EIT Digital
Skills you'll gain: Big Data, Data Management, Security Engineering, Security Strategy
Kennesaw State University
Skills you'll gain: Leadership and Management, Risk Management, Security Strategy, Strategy, Strategy and Operations, System Security, Security Engineering, Computer Security Incident Management, Regulations and Compliance, Systems Design
- Status: Free
Coursera Instructor Network
Google Cloud
Skills you'll gain: Critical Thinking, Security Engineering
Queen Mary University of London
Skills you'll gain: Cloud Computing
EIT Digital
Skills you'll gain: Big Data, Computer Security Incident Management, Data Management, Network Security, Security Engineering, Security Strategy, Software Security, System Security, Computer Security Models, Cyberattacks
Knowledge Accelerators
Skills you'll gain: Data Management
In summary, here are 10 of our most popular data+protection+strategy+implementation courses
- Data & Cybersecurity:Â Campus BBVA
- Protecting Business Innovations via Strategy:Â The Hong Kong University of Science and Technology
- IBM Data Privacy for Information Architecture:Â IBM
- Cybersecurity Architecture:Â IBM
- Security and Privacy for Big Data - Part 2:Â EIT Digital
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University
- Cybersecurity Best Practices:Â Coursera Instructor Network
- Modern Security Operations:Â Google Cloud
- Cloud Computing Law: Data Protection and Cybersecurity:Â Queen Mary University of London
- Database Essentials and Vulnerabilities:Â IBM