Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "protection"
Skills you'll gain: Secure Coding, Application Security, Authorization (Computing), Authentications, Data Validation, Role-Based Access Control (RBAC), Verification And Validation, Security Controls, User Accounts, Configuration Management, Package and Software Management, Identity and Access Management, Code Review, Software Installation, Data Integrity
- Status: Free
Macquarie University
Skills you'll gain: Microsoft Excel, Excel Macros, Excel Formulas, Data Validation, Data Modeling, Spreadsheet Software, Verification And Validation, Financial Modeling, Data Integrity, Data Security, Automation
Edureka
Skills you'll gain: AWS Identity and Access Management (IAM), Cloud Security, Threat Detection, Network Security, Incident Response, Identity and Access Management, Computer Security Incident Management, Amazon Web Services, Threat Management, IT Security Architecture, Data Security, Security Strategy, Data Loss Prevention, Application Security, Cloud Standards, Cyber Attacks, Security Controls, Cloud Computing, Intrusion Detection and Prevention, Security Management
University of Michigan
Skills you'll gain: Data Quality, Quantitative Research, Data Validation, Data Collection, Quality Assurance, Data Processing, Data Analysis, Data Integrity, Exploratory Data Analysis, Data Access, Statistical Analysis, Sampling (Statistics)
University of Colorado Boulder
Skills you'll gain: Data Ethics, Security Awareness, Computer Security Awareness Training, Ethical Standards And Conduct, Cybersecurity, Information Technology, Information Privacy, Media and Communications, Machine Learning, Vulnerability, Threat Detection, Personally Identifiable Information, Artificial Intelligence, Law, Regulation, and Compliance, Data Collection
Imperial College London
Skills you'll gain: Infectious Diseases, Infection Control, Epidemiology, Pharmaceuticals, Medical Science and Research, Preventative Care
University of Michigan
Skills you'll gain: Histogram, Data Visualization, Data Presentation, Descriptive Statistics, Data Storytelling, Statistics, Data Analysis, Exploratory Data Analysis, Probability & Statistics, Sampling (Statistics), Data Quality, Data Integrity
Skills you'll gain: Continuous Monitoring, Personally Identifiable Information, Risk Management, Risk Management Framework, Regulatory Compliance, Data Management, Information Privacy, Health Care Procedure and Regulation, Healthcare Industry Knowledge, Security Management, Health Information Management and Medical Records, Risk Analysis, Health Care, Security Awareness, Data Security, Cybersecurity, ISO/IEC 27001, Security Controls, Information Assurance, General Data Protection Regulation (GDPR)
Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Vulnerability Management, Secure Coding, Encryption, Cybersecurity, Infrastructure Security, Computer Security, Threat Modeling, Public Key Infrastructure, Data Security, Authentications, Data Integrity
Skills you'll gain: Endpoint Security, Vulnerability Management, Infrastructure as Code (IaC), Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Vulnerability Scanning, Network Architecture, Cloud Computing, Threat Management, Zero Trust Network Access, Cybersecurity, Cyber Attacks, Network Security, Cyber Security Assessment, IT Security Architecture, Threat Detection, Mobile Security, Hardening
University of Glasgow
Skills you'll gain: Data Ethics, Artificial Intelligence, Ethical Standards And Conduct, ChatGPT, Generative AI, Higher Education, Data Integrity, Machine Learning, Human Computer Interaction, Natural Language Processing
- Status: Free
University of Illinois Urbana-Champaign
Skills you'll gain: Financial Industry Regulatory Authorities, Asset Management, Financial Regulations, Financial Regulation, Securities (Finance), Investments, Investment Management, Law, Regulation, and Compliance, Regulatory Compliance, Portfolio Management, Private Equity, Wealth Management, Real Estate, Commercial Real Estate, Financial Services, Regulatory Requirements, Property and Real Estate, Due Diligence, Compliance Management
In summary, here are 10 of our most popular protection courses
- Laravel: Configure, Validate, Authenticate and Authorize: Infosec
- Compétences Excel professionnelles : Intermédiaire II: Macquarie University
- Cloud Security on AWS: Edureka
- Measuring Total Data Quality: University of Michigan
- Computing, Ethics, and Society Foundations: University of Colorado Boulder
- What Do Viruses Do And How Do We Control Them: Imperial College London
- How to Describe Data: University of Michigan
- ISC2 Healthcare Certificate: ISC2
- Security Architecture and Engineering: Packt
- Cloud Security, Resiliency, and Vulnerability Management: Packt