Filter by
The language used throughout the course, in both instruction and assessments.
Results for "data+protection+methods"
Skills you'll gain: Patch Management, Data Security, Cloud Security, Amazon Web Services, Data Governance, AWS Identity and Access Management (IAM), Cyber Governance, Cloud Management, Key Management, Amazon S3, Data Encryption Standard, Configuration Management
University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Information Systems Security, Cybersecurity, Encryption, Virtual Private Networks (VPN), Cyber Attacks, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting
Arizona State University
Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Security Strategy, Cyber Security Assessment, Security Controls, Incident Response, Data Storage, Vulnerability Assessments, Patch Management
- Status: Free
Whizlabs
Skills you'll gain: Data Governance, Extract, Transform, Load, Data Access, Metadata Management, Role-Based Access Control (RBAC), Data Cleansing, Databricks, Data Management, Data Lakes, Data Pipelines, Amazon Web Services, Data Security, Personally Identifiable Information, Data Processing, Data Warehousing, Data Quality, General Data Protection Regulation (GDPR)
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
University of Colorado Boulder
Skills you'll gain: Data Security, Cybersecurity, Cyber Attacks, Data Ethics, Authentications, Data Encryption Standard, Cryptography, Cyber Security Policies, Authorization (Computing), Security Controls, Data Integrity, Information Privacy, Security Awareness
Skills you'll gain: Cybersecurity, Cyber Operations, Cyber Threat Hunting, Intrusion Detection and Prevention, Scripting, Python Programming, Unix Commands, Command-Line Interface, Microsoft Windows, User Accounts
Microsoft
Skills you'll gain: Data Security, Cloud Security, Azure Active Directory, Microsoft Azure, Data Storage, Encryption, Cloud Storage, Personally Identifiable Information, Authorization (Computing), Data Access, Authentications, Database Management, Data Governance, Key Management, Role-Based Access Control (RBAC), Firewall
Skills you'll gain: Regulatory Compliance, Data Management, Healthcare Industry Knowledge, Health Information Management and Medical Records, Health Care, Data Security, Security Management, Personally Identifiable Information, Information Privacy, Electronic Medical Record, Data Sharing, Cybersecurity, Threat Management, Emerging Technologies
Skills you'll gain: Cloud Security, Microsoft Azure, Threat Management, Security Controls, Security Information and Event Management (SIEM), Key Management, Role-Based Access Control (RBAC), Cloud Services, Network Security, System Monitoring, Virtual Environment, Query Languages
Infosec
Skills you'll gain: Application Security, Secure Coding, Security Testing, Vulnerability Scanning, Security Controls, Intrusion Detection and Prevention, Security Awareness, Continuous Monitoring, Web Applications, Browser Compatibility
University of Minnesota
Skills you'll gain: Cloud Security, Data Security, Cloud Services, Cloud Storage, Personally Identifiable Information, General Data Protection Regulation (GDPR), Information Privacy, Data Governance, Data Integrity, Security Controls, Relational Databases, Encryption, SQL
In summary, here are 10 of our most popular data+protection+methods courses
- AWS: Data Protection and Security Governance: Whizlabs
- Security and Privacy in TOR Network: University of Colorado System
- Digital Safety and Security: Arizona State University
- Data Governance with Databricks: Whizlabs
- Cyber Attack Countermeasures: New York University
- Cybersecurity for Data Science: University of Colorado Boulder
- Execution, persistence, privilege escalation and evasion: Infosec
- Secure Your Data at Rest: Microsoft
- Information Technologies and Security in Healthcare Settings: ISC2
- Microsoft Defender Cloud Compliance - Secure Azure Services: Microsoft