Filter by
The language used throughout the course, in both instruction and assessments.
Results for "protection+schemes"
Automatic Data Processing, Inc. (ADP)
Skills you'll gain: Benefits Administration, Compensation and Benefits, Financial Services, Financial Planning, Insurance, Communication, Technical Communication, Administration, Equities, Program Evaluation, Employee Retention, Employee Engagement
The Hong Kong University of Science and Technology
Skills you'll gain: E-Commerce, Global Marketing, Brand Management, Business Strategies, Branding, Brand Strategy, Innovation, Strategic Partnership, Price Negotiation, New Business Development, Corporate Strategy, Mergers & Acquisitions, Business Process, Business Strategy, Business Software, Commercialization, New Product Development, Entrepreneurship, Creativity, Law, Regulation, and Compliance
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Databases, Software Architecture, Secure Coding, Object Oriented Design, Software Design Patterns, Systems Design, Software Engineering, Software Development Life Cycle, Technical Design, Security Engineering
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Data Security, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
The Hong Kong University of Science and Technology
Skills you'll gain: Brand Management, Branding, Brand Strategy, Innovation, Global Marketing, Peer Review, Law, Regulation, and Compliance, Regulation and Legal Compliance, E-Commerce, International Relations
- Status: Free
EIT Digital
Skills you'll gain: General Data Protection Regulation (GDPR), Information Privacy, Personally Identifiable Information, Data Security, Data Management, Data Governance, Vulnerability Assessments, Big Data, Encryption
Microsoft
Skills you'll gain: Microsoft Azure, Application Security, Cloud Security, Infrastructure Security, Kubernetes, Network Security, Security Engineering, Firewall, Endpoint Security, Identity and Access Management, Infrastructure As A Service (IaaS), Role-Based Access Control (RBAC), Cloud Services, Virtual Machines, Containerization, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Private Networks (VPN), Encryption
University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geospatial Information and Technology, Encryption, Data Security, Network Security, Information Systems Security, Public Key Infrastructure, Wireless Networks, Extensible Languages and XML
The Hong Kong University of Science and Technology
Skills you'll gain: Innovation, Business Software, Business Strategy, Creativity, Law, Regulation, and Compliance, Software Development
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Software Design, Programming Principles, Debugging, Program Development, C (Programming Language), Software Development Methodologies
Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Microsoft Azure, System Monitoring, Identity and Access Management, Cloud Security, Enterprise Security, Data Governance, Authorization (Computing), User Provisioning, Multi-Factor Authentication, Authentications
- Status: Free
Coursera Instructor Network
Skills you'll gain: Information Privacy, General Data Protection Regulation (GDPR), Personally Identifiable Information, Data Security, Data Governance, Data Ethics, Law, Regulation, and Compliance, Data Loss Prevention, Data Management, Security Controls, Regulatory Compliance, Compliance Management, Compliance Training, Data Sharing, Security Strategy, Regulatory Requirements, Data Processing, Risk Management, Employee Training, Risk Analysis
Searches related to protection+schemes
In summary, here are 10 of our most popular protection+schemes courses
- Benefits: Financial Protection, Growth & Assistance: Automatic Data Processing, Inc. (ADP)
- Protecting Business Innovation: The Hong Kong University of Science and Technology
- Secure Software Design: University of Colorado System
- Secure Coding Practices: University of California, Davis
- Protecting Business Innovations via Trademark: The Hong Kong University of Science and Technology
- Security and Privacy for Big Data - Part 2: EIT Digital
- Implement Platform Protection: Microsoft
- Advanced System Security Topics: University of Colorado System
- Protecting Business Innovations via Copyright: The Hong Kong University of Science and Technology
- Principles of Secure Coding: University of California, Davis