Filter by
The language used throughout the course, in both instruction and assessments.
Results for "endpoint+protection"
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Penetration Testing, Application Security, Data Security, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
EIT Digital
Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Management, Data Access, Vulnerability Assessments, Encryption, Information Privacy, Data Management, Big Data, Authorization (Computing)
Universidad de los Andes
Skills you'll gain: Cryptography, Security Requirements Analysis, Human Factors (Security), Encryption, Data Security, Security Management, Personally Identifiable Information, Threat Management, ISO/IEC 27001, Information Assurance, Cyber Attacks, Cybersecurity, Security Awareness, Law, Regulation, and Compliance
- Status: Free
Coursera Instructor Network
Skills you'll gain: Information Privacy, General Data Protection Regulation (GDPR), Personally Identifiable Information, Data Security, Data Governance, Data Ethics, Law, Regulation, and Compliance, Data Loss Prevention, Data Management, Security Controls, Regulatory Compliance, Compliance Management, Compliance Training, Data Sharing, Security Strategy, Regulatory Requirements, Data Processing, Risk Management, Employee Training, Risk Analysis
CertNexus
Skills you'll gain: Data Ethics, Accountability, Risk Management, Operational Risk, Risk Analysis, Information Privacy, Risk Mitigation, Safety and Security, Business Ethics, Artificial Intelligence, Diversity and Inclusion, Stakeholder Engagement
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Identity and Access Management, Business Risk Management, Security Controls
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Containerization, Encryption
The Hong Kong University of Science and Technology
Skills you'll gain: E-Commerce, Global Marketing, Business Strategies, Innovation, Strategic Partnership, Business Strategy, Price Negotiation, New Business Development, Corporate Strategy, Mergers & Acquisitions, Law, Regulation, and Compliance, Competitive Analysis, Resource Management, Resource Utilization
University of Colorado System
Skills you'll gain: Infrastructure Security, Cyber Risk, Cyber Security Policies, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Risk Management Framework, Technology Roadmaps, Network Infrastructure, Transportation Operations, Infrastructure Architecture
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Infrastructure Security, Firewall, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing, System Configuration
Microsoft
Skills you'll gain: Microsoft Azure, Cloud Security, Data Security, Network Security, Cloud Applications, Authorization (Computing), Role-Based Access Control (RBAC), Application Security, Microsoft SQL Servers, Cloud Development, Azure Active Directory, Data Loss Prevention, Firewall, Relational Databases, Key Management, Identity and Access Management, Threat Detection, Encryption, Virtual Machines
Microsoft
Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Security Controls, Threat Detection, Malware Protection, Application Performance Management, Event Monitoring, Incident Response, Incident Management, Virtual Machines, Anomaly Detection, Query Languages
In summary, here are 10 of our most popular endpoint+protection courses
- Secure Coding Practices: University of California, Davis
- Security and Privacy for Big Data - Part 1: EIT Digital
- Principios y Regulaciones de Seguridad de la Información: Universidad de los Andes
- Data Privacy and Protection Standards: Coursera Instructor Network
- Detect and Mitigate Ethical Risks: CertNexus
- Tools for Security Specialists: Codio
- Systems and Application Security: ISC2
- Protecting Business Innovations via Strategy: The Hong Kong University of Science and Technology
- Cybersecurity Policy for Aviation and Internet Infrastructures: University of Colorado System
- Palo Alto Networks Cybersecurity Foundation: Palo Alto Networks