Filter by
The language used throughout the course, in both instruction and assessments.
Results for "protection"
Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, Security Controls, Cloud Security, Encryption, Data Security, Information Assurance, Cybersecurity, Identity and Access Management, Cloud Computing, Penetration Testing, Personally Identifiable Information, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Incident Management
Skills you'll gain: Data Ethics, Data Analysis, Data Security, Google Sheets, Databases, Data Storage, Data Quality, Data Integrity, Data Management, Data Collection, Data Manipulation, Relational Databases, SQL, Metadata Management, Unstructured Data
LearnQuest
Skills you'll gain: Blockchain, Key Management, Cryptography, Application Security, Cryptographic Protocols, Encryption, Security Engineering, Secure Coding, Data Security, Threat Modeling, Public Key Cryptography Standards (PKCS), Security Testing, Cybersecurity, Solution Design, Authentications, Vulnerability Assessments, Solution Architecture, Code Review, Authorization (Computing)
Skills you'll gain: Network Security, Encryption, Cybersecurity, Security Awareness, Cyber Attacks, Security Management, Security Strategy, Threat Detection, Firewall, Wireless Networks, Technical Support, Malware Protection, Authentications, Multi-Factor Authentication, Authorization (Computing), Generative AI
Infosec
Skills you'll gain: Authentications, Application Security, Secure Coding, Serverless Computing, Cryptography, Risk Management Framework, Threat Modeling, Cloud Security, Infrastructure Security, Package and Software Management, Node.JS, Web Applications, Javascript, Vulnerability Management, Cloud Services, Cloud Platforms, Web Development, Identity and Access Management, Dependency Analysis, Vulnerability Assessments
Skills you'll gain: Identity and Access Management, Cloud Security, DevSecOps, Cloud Computing, Role-Based Access Control (RBAC), Google Cloud Platform, Network Security, Cloud Computing Architecture, IT Automation, General Networking, Infrastructure Security, Security Controls, Infrastructure as Code (IaC), Virtualization
Skills you'll gain: Open Web Application Security Project (OWASP), Security Controls, Risk Management, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, NIST 800-53, Cyber Security Policies, Cyber Risk, Safety Audits, Threat Detection, Compliance Auditing
- Status: Free
The University of North Carolina at Chapel Hill
Skills you'll gain: Environmental Policy, Law, Regulation, and Compliance, Pollution Prevention, Environment and Resource Management, Natural Resource Management, Water Resources, Risk Analysis, Social Justice, Research
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
- Status: Free
Skills you'll gain: Data Management, Data Loss Prevention, Data Security, Google Cloud Platform, Personally Identifiable Information, Big Data, Identity and Access Management
Skills you'll gain: Data Cleansing, Sampling (Statistics), Data Integrity, Data Quality, Data Validation, Google Sheets, Data Analysis, Data Manipulation, SQL, Data Transformation, Spreadsheet Software, Microsoft Excel
In summary, here are 10 of our most popular protection courses
- Protection of Information Assets: Packt
- Prepare Data for Exploration: Google
- Blockchain Security Advanced Protection : LearnQuest
- IT Security: Defense against the digital dark arts : Google
- JavaScript Security: Infosec
- Introduction to Security Principles in Cloud Computing: Google Cloud
- Play It Safe: Manage Security Risks: Google
- Introduction to Environmental Law and Policy: The University of North Carolina at Chapel Hill
- IBM Cybersecurity Analyst: IBM
- Connect and Protect: Networks and Network Security: Google